Characteristic of the modern types of spyware information programs

Authors

  • Hristo Hristov Шуменски университет „Епископ Константин Преславски“

DOI:

https://doi.org/10.5281/zenodo.5660997

Abstract

In this paper a characteristic of the modern types of spyware information programs is made.

Downloads

Download data is not yet available.

References

Боянов, П. Кибератаки и противодействие. Монография. Шумен: Епископ Константин Преславски, 2017, 210 с. ISBN 978-619-201-206-9.

Савов, И. Относно някои аспекти от процедурите по използване на трафичните данни в Република България и някои европейски страни. – В: Международна конференция „Противодействие на радикализацията и тероризма“, Академия на МВР, април 2017 г. ISBN 978-954-348-145-3.

Савов, И. Един поглед върху същността на киберпрестъпленията. – В: Политика и сигурност, ВУСИ, 2017. ISSN 2535-0358.

Ташева, Ж. Н., П. Кр. Боянов. Сравнителен анализ на злонамерени уеббазирани атаки. – В: Научна конференция на тема „Защитата на личните данни в контекста на информационната сигурност“. Факултет „Артилерия, ПВО и КИС“ при Националния военен университет „Васил Левски“, Шумен, 6 – 7 юни 2013. ISBN 978-954-9681-49-9.

Allen, L. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Birmingham, UK: Packt Publishing, 2012. ISBN 978-1-84951-774-4.

Bodmer, S., M. Kilger, Gr. Carpenter, J. Jones. Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Education, 2012. ISBN 978-0-07-177250-1.

Boyanov, P. Educational exploiting the information resources and invading the security mechanisms of the operating system Windows 7 with the exploit Eternalblue and Backdoor Doublepulsar. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 14, 2018. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.

Boyanov, P. A taxonomy of the cyber attacks. – In: Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 3, 2013. ISSN 1314-6289. [online]. http://www.rst-tto.com/publication.html.

Kahya-Özyirmidokuz, E., A. Gezer, C. Ciflikli. Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application. – In: Data Analytics, The First International Conference on Data Analytics, September, 2012. ISBN 978-1-61208-242-4.

Kaur, R., G. Singh. Analysing, Port Scanning Tools and Security Techniques. – In: International Journal of Electrical Electronics & Computer Science Engineering, Vol. 1, Issue 5, October 2014. ISSN 2348 2273.

Meyers, C., S. Powers, D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. No. LLNL-TR-419023. – In: Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2009.

Meyers, C., S. Powers, D. Faissol. Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. – In: Lawrence Livermore National Laboratory, April 2009, Vol. 7.

Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. – In: Information Technology and Security, No. 1(3), 2013.

Oram, A., J. Viega. Beautiful Security. – In: O’Reilly Media, 2009. ISBN 978-0-596-52748-8.

Savov, I. The collision of national Security and Privacy in the age of information technologies. – In: European Police Science and Research Bulletin, European Union Agency for Law Enforcement Training, 2017. ISSN 2443-7883.

Shimeall, T. J., J. M. Spring. Introduction to Information Security: A Strategic-Based Approach. Syngress, 2014. ISBN 978-1-59749-969-9.

Simmons, C., S. Shiva, D. Dasgupta, Q. Wu. AVOIDIT: A cyber attack taxonomy. University of Memphis. – In: Proceedings of the 9th Annual Symposium on Information Assurance (ASIA ’14), Albany, NY, USA, June 3 – 4, 2014.

Downloads

Published

31-03-2019

Issue

Section

NATIONAL SECURITY AND PUBLIC ORDER

How to Cite

Characteristic of the modern types of spyware information programs. (2019). Politics & Security, 3(1), 30-37. https://doi.org/10.5281/zenodo.5660997