COMPUTER SECURITY

Authors

  • Lauris Glīzds Rezekne Academy of Technologies (LV)
  • Artis Teilāns Rezekne Academy of Technologies (LV)

DOI:

https://doi.org/10.17770/het2017.21.3588

Keywords:

computer security, cyber security, IT security

Abstract

The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.

Downloads

Download data is not yet available.

References

Gasser, Morrie (1988). Building a Secure Computer System (PDF). Van Nostrand Reinhold. p. 3. ISBN 0-442-23022-2. Retrieved 6 September 2015.

"Definition of computer security". Encyclopedia. Ziff Davis, PCMag. Retrieved 6 September 2015.

Rouse, Margaret. "Social engineering definition". TechTarget. Retrieved 6 September 2015.

"Reliance spells end of road for ICT amateurs", May 07, 2013, The Australian

"Computer Security and Mobile Security Challenges" (pdf). researchgate.net. Retrieved 2016-08-04.

"Distributed Denial of Service Attack". csa.gov.sg. Retrieved 12 November 2014.

"What is Spoofing? - Definition from Techopedia".

Gallagher, Sean (May 14, 2014). "Photos of an NSA "upgrade" factory show Cisco router getting implant". Ars Technica. Retrieved August 3, 2014.

"Identifying Phishing Attempts". Case.

Arcos Sergio. "Social Engineering" (PDF).

Scannell, Kara (24 Feb 2016). "CEO email scam costs companies $2bn". Financial Times (25 Feb 2016). Retrieved 7 May 2016.

"Bucks leak tax info of players, employees as result of email scam". Associated Press. 20 May 2016. Retrieved 20 May 2016.

J. C. Willemssen, "FAA Computer Security". GAO/T-AIMD-00-330. Presented at Committee on Science, House of Representatives, 2000.

"Financial Weapons of War". Minnesota Law Review. 2016. SSRN 2765010.

Pagliery, Jose. "Hackers attacked the U.S. energy grid 79 times this year". CNN Money. Cable News Network. Retrieved 16 April 2015.

"Vulnerabilities in Smart Meters and the C12.12 Protocol". SecureState. 2012-02-16. Retrieved 4 November 2016.

"Is Your Watch Or Thermostat A Spy? Cybersecurity Firms Are On It". NPR.org. 6 August 2014.

Melvin Backman (18 September 2014). "Home Depot: 56 million cards exposed in breach". CNNMoney.

"Staples: Breach may have affected 1.16 million customers' cards". Fortune.com. December 19, 2014. Retrieved 2014-12-21.

"Target security breach affects up to 40M cards". Associated Press via Milwaukee Journal Sentinel. 19 December 2013. Retrieved 21 December 2013.

Jim Finkle (23 April 2014). "Exclusive: FBI warns healthcare sector vulnerable to cyber attacks". Reuters. Retrieved 23 May 2016.

Bright, Peter (February 15, 2011). "Anonymous speaks: the inside story of the HBGary hack". Arstechnica.com. Retrieved March 29, 2011.

Anderson, Nate (February 9, 2011). "How one man tracked down Anonymous—and paid a heavy price". Arstechnica.com. Retrieved March 29, 2011.

Palilery, Jose (December 24, 2014). "What caused Sony hack: What we know now". CNN Money. Retrieved January 4, 2015.

James Cook (December 16, 2014). "Sony Hackers Have Over 100 Terabytes Of Documents. Only Released 200 Gigabytes So Far". Business Insider. Retrieved December 18, 2014.

"Internet strikes back: Anonymous' Operation Megaupload explained". RT. 20 January 2012. Archived from the original on 5 May 2013. Retrieved May 5, 2013.

"Gary McKinnon profile: Autistic 'hacker' who started writing computer programs at 14". The Daily Telegraph. London. 23 January 2009.

"Gary McKinnon extradition ruling due by 16 October". BBC News. September 6, 2012. Retrieved September 25, 2012.

Law Lords Department (30 July 2008). "House of Lords – Mckinnon V Government of The United States of America and Another". Publications.parliament.uk. Retrieved 30 January 2010. 15. … alleged to total over $700,000

"NSA Accessed Mexican President's Email", October 20, 2013, Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark, spiegel.de

Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. Retrieved 5 June 2015.

Liptak, Kevin (4 June 2015). "U.S. government hacked; feds think China is the culprit". CNN. Retrieved 5 June 2015.

Sean Gallagher. "Encryption "would not have helped" at OPM, says DHS official".

"Schools Learn Lessons From Security Breaches". Education Week. 19 October 2015. Retrieved 23 May 2016.

RFC 2828 Internet Security Glossary

CNSS Instruction No. 4009 dated 26 April 2010

InfosecToday Glossary

Definitions: IT Security Architecture. SecurityArchitecture.org, Jan, 2006

Jannsen, Cory. "Security Architecture". Techopedia. Janalta Interactive Inc. Retrieved 9 October 2014.

"Cybersecurity at petabyte scale".

Woodie, Alex (9 May 2016). "Why ONI May Be Our Best Hope for Cyber Security Now". Retrieved 13 July 2016.

"Firms lose more to electronic than physical theft". Reuters.

"The Hacker in Your Hardware: The Next Security Threat". Scientific American.

Waksman, Adam; Sethumadhavan, Simha (2010), "Tamper Evident Microprocessors"(PDF), Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California

"Sentinel HASP HL". E-Spin. Retrieved 2014-03-20.

"Token-based authentication". SafeNet.com. Retrieved 2014-03-20.

"Lock and protect your Windows PC". TheWindowsClub.com. Retrieved 2014-03-20.

James Greene (2012). "Intel Trusted Execution Technology: White Paper" (PDF). Intel Corporation. Retrieved 2013-12-18.

"SafeNet ProtectDrive 8.4". SCMagazine.com. 2008-10-04. Retrieved 2014-03-20.

"Secure Hard Drives: Lock Down Your Data". PCMag.com. 2009-05-11.

"Top 10 vulnerabilities inside the network". Network World. 2010-11-08. Retrieved 2014-03-20.

"Forget IDs, use your phone as credentials". Fox Business Network. 2013-11-04. Retrieved 2014-03-20.

Lipner, Steve (2015). "The Birth and Death of the Orange Book". IEEE Annals of the History of Computing. 37 (2): 19–31. doi:10.1109/MAHC.2015.27.

Kelly Jackson Higgins (2008-11-18). "Secure OS Gets Highest NSA Rating, Goes Commercial". Dark Reading. Retrieved 2013-12-01.

"Board or bored? Lockheed Martin gets into the COTS hardware biz". VITA Technologies Magazine. December 10, 2010. Retrieved 9 March 2012.

Sanghavi, Alok (21 May 2010). "What is formal verification?". EE Times_Asia.

Downloads

Published

2017-04-19

Issue

Section

Information technology, mechatronics, electronics

How to Cite

[1]
L. Glīzds and A. Teilāns, “COMPUTER SECURITY”, HET, no. 21, pp. 101–108, Apr. 2017, doi: 10.17770/het2017.21.3588.