Viruses, hardware and software trojans : attacks and countermeasures /: attacks and countermeasures. ([2020])
- Record Type:
- Book
- Title:
- Viruses, hardware and software trojans : attacks and countermeasures /: attacks and countermeasures. ([2020])
- Main Title:
- Viruses, hardware and software trojans : attacks and countermeasures
- Further Information:
- Note: Anatoly Belous, Vitali Saladukha.
- Authors:
- Belous, A. I (Anatoliĭ Ivanovich)
Saladukha, Vitali - Contents:
- Intro -- Preface -- Acknowledgements -- Contents -- 1 Information Weapon: Concepts, Means, Methods, and Examples of Application -- 1.1 Information Security of a Modern State -- 1.1.1 Historical Aspects of the Emergence and Development of Information Security -- 1.1.2 Main Goals and Items of State Information Security -- 1.1.3 Sources of Threats to Information Security -- 1.1.4 Main Tasks of Information Security -- 1.1.5 Information Security Technologies -- 1.2 Basics of Information Warfare -- 1.2.1 Introduction -- 1.2.2 Types of Information Attacks -- 1.2.3 Means of Information Warfare -- 1.2.4 Classification of Information Weapons 1.3 Definition and Classification of Information Technology Impacts -- 1.4 Most Common Means of Information Technology Impact -- 1.4.1 Remote Network Attacks -- 1.4.2 Examples of Information Technology Impact Implementation Using Remote Network Attacks -- 1.4.3 Using a False Object to Organize a Remote Attack -- 1.5 Technical Channels of Information Leakage -- 1.5.1 Classification and Principles of Operation -- 1.5.2 Electromagnetic Channels of Computer-Processed Information Leakage -- 1.5.3 Artificial Technical Channels of Information Leakage 1.5.4 Methods for Sensitive Information Retrieval Based on the Analysis of Acoustic and Electromagnetic Radiation -- 1.6 Typical Examples of Viruses and Trojans -- 1.6.1 NetBus Virus -- 1.6.2 Trojan Programs -- 1.6.3 Ways to Detect Trojans -- 1.6.4 Neutralizers of Tests and Code Analysis Software -- 1.7Intro -- Preface -- Acknowledgements -- Contents -- 1 Information Weapon: Concepts, Means, Methods, and Examples of Application -- 1.1 Information Security of a Modern State -- 1.1.1 Historical Aspects of the Emergence and Development of Information Security -- 1.1.2 Main Goals and Items of State Information Security -- 1.1.3 Sources of Threats to Information Security -- 1.1.4 Main Tasks of Information Security -- 1.1.5 Information Security Technologies -- 1.2 Basics of Information Warfare -- 1.2.1 Introduction -- 1.2.2 Types of Information Attacks -- 1.2.3 Means of Information Warfare -- 1.2.4 Classification of Information Weapons 1.3 Definition and Classification of Information Technology Impacts -- 1.4 Most Common Means of Information Technology Impact -- 1.4.1 Remote Network Attacks -- 1.4.2 Examples of Information Technology Impact Implementation Using Remote Network Attacks -- 1.4.3 Using a False Object to Organize a Remote Attack -- 1.5 Technical Channels of Information Leakage -- 1.5.1 Classification and Principles of Operation -- 1.5.2 Electromagnetic Channels of Computer-Processed Information Leakage -- 1.5.3 Artificial Technical Channels of Information Leakage 1.5.4 Methods for Sensitive Information Retrieval Based on the Analysis of Acoustic and Electromagnetic Radiation -- 1.6 Typical Examples of Viruses and Trojans -- 1.6.1 NetBus Virus -- 1.6.2 Trojan Programs -- 1.6.3 Ways to Detect Trojans -- 1.6.4 Neutralizers of Tests and Code Analysis Software -- 1.7 Cybersecurity of Power Facilities: Past, Present, and Future -- 1.7.1 Introduction -- 1.7.2 Basic Principles of Assurance Cybersecurity of Power Facilities -- 1.7.3 Major Cyberthreats for Facilities of Fuel and Energy Industry and Ways of Their Elimination -- 1.7.4 Assurance of Cybersecurity of Power Facilities of the USA -- 1.8 Conclusion -- References 2 Computer Viruses, Malicious Logic, and Spyware -- 2.1 Computer Viruses -- 2.1.1 Terms and Definitions -- 2.1.2 A Brief History of Computer Viruses -- 2.1.3 Classification of Computer Viruses -- 2.1.4 Specifics of Using the Stuxnet Virus as a Type of Cyberweapon -- 2.2 Implants: Types, Ways of Injection, and Methods of Protection -- 2.2.1 Introduction to the Problem of Software Implants -- 2.2.2 Dangers of Implants -- 2.2.3 Classifications of Software Implants -- 2.2.4 Implant Types -- 2.3 Models of Influence of Software Implants on Computers, Introduction Methods, and Interaction with Intruders 2.3.1 Models of Impact of Software Implants on Computers -- 2.3.2 Methods of Implementation of Software Implants and Computer Viruses -- 2.3.3 Scenarios of Introduction of Software Implants During Different Stages of Software Lifecycle -- 2.3.4 Methods of Interaction Between Software Implant and Intruder -- 2.4 Software Keyboard Spies -- 2.4.1 Operating Principle of Keyloggers -- 2.4.2 Keyboard Input Tracking Methods -- 2.5 Basic Operating Principles of Rootkit Technologies -- 2.5.1 What Is a Rootkit Technology? -- 2.5.2 Methods of Intercepting API Functions in User Mode -- 2.5.3 Methods of Interception of Rootkit Functions in Kernel Mode … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (xxii, 822 pages), illustrations (some color)
- Subjects:
- 005.8/8
621.3815
Computer viruses
Hardware Trojans (Computers)
Computer viruses
Hardware Trojans (Computers)
Electronic books - Languages:
- English
- ISBNs:
- 9783030472184
3030472183 - Related ISBNs:
- 3030472175
9783030472177 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (Ebook Central, viewed October 1, 2020). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.513764
- Ingest File:
- 03_096.xml