Illegal invasion of computer information systems

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This article describes the illegal invasion of computer systems, mainstream means of hidden Trojan horse property, describe the characteristics of several types of malicious code, and stressed the importance of computer information system security. Describe the basic idea of the invasion of the system means, mostly utilize the loopholes of the software vulnerability or system loophole, or inject malicious code to the target system, and then elevated privileges to obtain information, or undermine the data of the system. List several elements of the computer information system security, and stressed the importance of cryptographic algorithm as the core of secure communication protocols in computer communications. Explain the characteristics of public key cryptography, introduce RSA encryption algorithm as the example of it. Through the analysis of the security elements, hold out the methods of precautions. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhang, K. (2013). Illegal invasion of computer information systems. In Lecture Notes in Electrical Engineering (Vol. 208 LNEE, pp. 175–182). https://doi.org/10.1007/978-1-4471-4796-1_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free