Query Result Set
Skip Navigation Links
   ActiveUsers:1030Hits:18500485Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
COMPUTER HACKING (3) answer(s).
 
SrlItem
1
ID:   098085


Changing face of modern conflicts: shaping the Indian response / Davar, Kamaleshwar   Journal Article
Davar, Kamaleshwar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
2
ID:   117148


Contours of security in Cyberspace / Poduval, Sanjay   Journal Article
Poduval, Sanjay Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The cyberspace is an intangible medium operating and controlling many aspects of the tangible world. It is a world without barriers therefore artificial barriers have to be erected to prevent free ingress or egress. This is a world still in the nascent stages of its evolution; therefore to stay ahead of the pack we need to be imaginative and innovative. The increasing interconnection of the world's computers, standardization of communications protocols and computing hardware enable a single worm developed attack many systems. This provides attractive avenues for cyber attackers to exploit. Complementing these features, are today's cyber criminals who are increasingly adept at gaining undetected access and maintaining a persistent, low-profile, long-term presence in IT environments. Moreover difficulties in identifying attackers, coupled with an uncertain legal and policy framework, make it difficult to punish the offenders. Therefore, one has to take proactive steps, be vigilant and increase the cost of intrusions to keep unwanted visitors at bay. Today cyber attackers, armed with constantly evolving malicious code are likely to have more paths into a network and extract the secrets it contains making the task of the system administrators a herculean one. The elegance of computer hacking lies in the fact that it may be attempted for a fraction of the cost; all one requires is a laptop connected to the internet and a lot of patience. With this in mind the paper attempts to give an insight into the various contours of cyber security which should be a valuable tool in appreciating the vulnerabilities of the cyberspace.
        Export Export
3
ID:   188079


Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks / Holt, Thomas J   Journal Article
Holt, Thomas J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda.
        Export Export