IJISC
  • Indexed in

  • Latest News

    December 27, 2019
    Volume 8, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2019
    Volume 8, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis


    Author(s): TRIFAN, Mihai

    Quick view | Full article | Citations | Views: 1,760


    Author(s) keywords: , , ,


    Reference keywords: , , ,


    Abstract:

    As computer devices have become more pervasive, so has Malware. Cell phones, email, instant messaging, internet browsing, everyone is threatened. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to a computer or a computer network, but there are differences among the three. This paper analyses both similarities and differences between the three methods of attack.



    References:

    [1]. Răzvan Rughiniș, Răzvan Deaconescu, George Milescu, Mircea Bardac, Introducere în sisteme de operare, Editura Printech

    [2]. Dr. Frederick B. Cohen, A short Course on Computer Viruses, ASP Press

    [3]. Rick Lehtinen; G.T. Gangemi Sr., Computer Security Basics, Second Edition, O'Reilly Media, Inc.

    [4]. Robert Jones, Internet Forensics, O'Reilly Media, Inc.

    [5]. Goldberg, R. (2001) “Architecture of Virtual Machines”, AFIPS National Computer Conference. New York – NY– USA.

    [6]. Broersma, Matthew. “Trojan Targets Microsoft's AntiSpyware Beta” http://www.eweek.com/article2/0,1759,1763560,00.asp, July 2011;

    [7]. McClure Stuart, Securitatea rețelelor, Editura Teora, 2002;

    [8]. Parker Tim, TCP/IP, Editura Teora, 2002;

    [9]. King, S., Chen, P. (2002) “Operating System Extensions to Support Host Based Virtual Machines”, Technical Report CSE-TR-465-02, University of Michigan.

    [10]. Dormann, Will. “Multiple web browsers vulnerable to spoofing via Internationalized Domain Name support” http://www.kb.cert.org/ vuls/id/273262, March 2012;

    [11]. http://www.kaspersky.com/images/Kaspersky%20report-10-134377.pdf

    [12]. http://www.securitatea-informatiilor.ro/tipuri-de-atacuri/ce-porturi-folosesc-virusii-viermii-sau-troienii-238.html

    [13]. http://www.securitatea-informatiilor.ro/tipuri-de-atacuri/modele-de-atac-113.html

    [14]. http://www.chip.ro/blog/corina-cailean/18242-atacuri-informatice-in-2012-inte-stabilite-rzboi-cibernetic-ameninri-mobile

    [15]. http://computer.howstuffworks.com/worst-computer-viruses.htm#page=10

    [16]. http://hackmageddon.com/tag/computer-crime/



    Additional Information

    English title: Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis
    Original title: Analiza atacurilor informatice de tip viruși, troieni și viermi informatici
    Author(s): TRIFAN, Mihai
    Article Language: Romanian
    Date of Publication: 2012-06-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.01.05
    Issue: Volume 1, Issue 1, Year 2012
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 46-54 (9 pages)



    Copyright ©2012-2020
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.