IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • The Structure of Cyber Attacks


    Author(s): MITRĂ, Silviu-Elian

    Quick view | Full article | Citations | Views: 381


    Author(s) keywords: , , , ,


    Reference keywords: ,


    Abstract:

    The objective of this portfolio is to ensure a good understanding of the topic of the complex and unique mode of action of cyber attacks, as well as the study of the ways in which they occur. The content of this portfolio includes from the beginning of computer viruses to the specific modern mechanisms of cyber attack undertaken by cybercriminals in order to cause detriment, but also theft or damage to certain information. Furthermore, this paper also provides essential aspects regarding the protection methods that users must undertake so that they can prevent and at the same time face these dangers specific to our age. In the elaboration of this study, there were used both personal methods, by applying my own knowledge accumulated through the study, and accessing external sources containing information necessary to complete the insufficiently analyzed problems. In essence, the elaboration of this study ensured the coverage of all relevant domains and aspects that are based on the structure and conception of cyber attacks, as well as in the manner provided by their action and manifestation.



    References:

    [1]. Comodo Antivirus, What is a Computer Virus and its Types, https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/.
    [2]. CISCO, What Is Cybersecurity?, https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html.
    [3]. Criminalitatea informatică - Platformă de prevenire a criminalității informatice, https://www.criminalitatea-informatica.ro/.
    [4]. CISCO, What Is Network Security?, https://www.cisco.com/c/en/us/products/security/what-is-network-security.html#~types.



    Additional Information

    Article Title: The Structure of Cyber Attacks
    Author(s): MITRĂ, Silviu-Elian
    Date of Publication: 2020-06-22
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2020.01.06
    Issue: Volume 9, Issue 1, Year 2020
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 43-52 (10 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.