The Structure of Cyber Attacks
Author(s): MITRĂ, Silviu-Elian
Author(s) keywords: cyber attack, cybercrime, hacker, information, Trojan
Reference keywords: cyber criminals, cyber-attacks
Abstract:
The objective of this portfolio is to ensure a good understanding of the topic of the complex and unique mode of action of cyber attacks, as well as the study of the ways in which they occur. The content of this portfolio includes from the beginning of computer viruses to the specific modern mechanisms of cyber attack undertaken by cybercriminals in order to cause detriment, but also theft or damage to certain information. Furthermore, this paper also provides essential aspects regarding the protection methods that users must undertake so that they can prevent and at the same time face these dangers specific to our age. In the elaboration of this study, there were used both personal methods, by applying my own knowledge accumulated through the study, and accessing external sources containing information necessary to complete the insufficiently analyzed problems. In essence, the elaboration of this study ensured the coverage of all relevant domains and aspects that are based on the structure and conception of cyber attacks, as well as in the manner provided by their action and manifestation.
References:
[1]. Comodo Antivirus, What is a Computer Virus and its Types, https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/.
[2]. CISCO, What Is Cybersecurity?, https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html.
[3]. Criminalitatea informatică - Platformă de prevenire a criminalității informatice, https://www.criminalitatea-informatica.ro/.
[4]. CISCO, What Is Network Security?, https://www.cisco.com/c/en/us/products/security/what-is-network-security.html#~types.
Article Title: The Structure of Cyber Attacks
Author(s): MITRĂ, Silviu-Elian
Date of Publication: 2020-06-22
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2020.01.06
Issue: Volume 9, Issue 1, Year 2020
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 43-52 (10 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.