This article describes the illegal invasion of computer systems, mainstream means of hidden Trojan horse property, describe the characteristics of several types of malicious code, and stressed the importance of computer information system security. Describe the basic idea of the invasion of the system means, mostly utilize the loopholes of the software vulnerability or system loophole, or inject malicious code to the target system, and then elevated privileges to obtain information, or undermine the data of the system. List several elements of the computer information system security, and stressed the importance of cryptographic algorithm as the core of secure communication protocols in computer communications. Explain the characteristics of public key cryptography, introduce RSA encryption algorithm as the example of it. Through the analysis of the security elements, hold out the methods of precautions. © 2013 Springer-Verlag.
CITATION STYLE
Zhang, K. (2013). Illegal invasion of computer information systems. In Lecture Notes in Electrical Engineering (Vol. 208 LNEE, pp. 175–182). https://doi.org/10.1007/978-1-4471-4796-1_22
Mendeley helps you to discover research relevant for your work.