Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 3
Words: 1100

Named after the relevant section the nigerian penal code


2). Botnets and Other Dirty Tricks

In the past, people wrote viruses for a very simple reason: to show that they could. Now, they do it for an even simpler reason: to make money. After gaining control of your computer, the bad guys can make money off of you in several ways. They can steal your credit card and bank account information and either use it or sell it. More commonly, they'll add your computer to a botnet(Botnets are a major threat to the safety and security of the Internet), a collection of thousands or even millions of computers that can be rented out to anyone who wants to send out spam. It's a great deal for the owner of the virus and for the spammers. They can send out millions of spam emails for only a few hundred dollars, and since it's coming from a huge number of computers owned by people who for the most part have no idea what's happening, they don't have to worry about having their own computers or internet connection shut down. Of course, the rest of us pay for that with tons of junk email (along with slower computers, if we're part of the botnet).

Obviously, this leads to several areas of research. How do we detect botnets? How do we defend against viruses? How do we recognize spam? These are all areas that could legitimately fall under the broad heading of (research on) network security.

3). Phishing

4).Linxu-based Kernel Level Content Switch or Application Level Content Switch Design:

We have developed Linux-based Content Switches (LCS and LACS) for routing packets based on IP/port/SSL Session ID/url/XML content of the incoming packets and a set of switching rules. Related research topics are:

5). SysSec

  1. creating a virtual center of excellence, to consolidate the Systems Security research community in Europe

  2. promoting cybersecurity education

Topics of Interest

  • new attacks, evasion techniques, and defenses

  • operating system security

  • mobile systems security

  • measuring security

  • wireless sensor networks and smart environments security

Copyright © 2009-2023 UrgentHomework.com, All right reserved.