Types of malware and malware distribution strategies

A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

Подобные документы

  • ??????? ???????? ??????????, ?????????????? ?? ??????? ?????. ??????????? ??????????? ? ????????? ????????. ??????? ???????? ????????? Neural Network Wizard. ???????? ????????? ?????? ???????????? ????????? ???????????????. ???? ?????????? ?? ????????.

    ???????, добавлен 14.10.2013

  • Consideration of book presentsways, him ?????????????? in statistical models on the different levels of analysis, successive theoretical structure that places the models of lids as decision elements in a race between a steganography and steganalysis.

    ??????? ???????, добавлен 08.03.2014

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    ??????? ???????, добавлен 08.03.2014

  • ?????????? ?? ?????? ?????????? Neural Network ??????????? ?????????? ??? ??????????????? ????????? ???????, ?????????????? ????????? ?????? ? ??????????? ??????????. ??????? ???????? ??????? ??? ?????????? ??????????????? ? ??????????? ???????????.

    ??????, добавлен 05.04.2020

  • ????????? ? ??????? ????????? ??????????? ? ?????????????? ?? ??????????? ?????????. ??????????????, ????????? ???????????? ??? ????? ?????????? ????? ?????????????? ??????. ????????? ???????? ??? ERwin, S-Designor, Computer-aided software engineering.

    ????????? ??????, добавлен 19.12.2016

  • Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.

    ??????, добавлен 02.10.2024

  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    ???????????, добавлен 06.02.2017

  • The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.

    ??????, добавлен 06.07.2023

  • The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.

    ??????, добавлен 30.04.2018

  • ????????????? ?????????? ????????????? ? ???????????? ?????????? ???????????? ??????. ?????????????? ?????? ?????? ????????? ????????????; ?????? Queue Network. ???????? ?????????????? ???????????? ?????? ? ??????; ????????????? ???????? ??????????.

    ??????, добавлен 26.04.2019

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    ??????, добавлен 25.03.2016

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    ?????, добавлен 08.03.2014

  • Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.

    ??????, добавлен 26.06.2016

  • ??????????? ???????????? ???????? ?????????? ??????, ??? ???????????? ????????? ??????. ???????? ??????? ?? ????????? ???????????? ????????????? ???????? ?? ???????. ??????????? ????? (reverse engineering) ?? ????????? ??? ??????? ?????????? ???????.

    ???????????? ??????, добавлен 07.02.2014

  • Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.

    ??????, добавлен 14.12.2024

  • The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.

    ??????, добавлен 25.12.2016

  • ??????????? ??????????? ?????? ????????? ????????? ?????? ?? ???????????? ? Business Intelligence, ?? ??????? ??????????. ??????? ???????????? ??????-?????? ???-???????? ??? ?????? ????????? ????? ?? ???????? ????????? ????? ?? ???????? UAhosting.

    ??????????? ??????, добавлен 21.01.2016

  • ????????? ?????????? "business intelligence" (BI-??????????) ? ????????? ??????????? ???????? ??? ????? ? ????????????? ?????? ? ?????????? ??????? ? ???????? ????????. ?????? ??????? ?????????? ? ??????, ??????????? ??? ???????? ??????????????? ???????.

    ??????, добавлен 25.02.2019

  • Theory of condensation growth of aerosol particles under saturation conditions. Mathematical description of heat and mass transfer processes. The structure of mathematical models and the algorithm of pollution dynamics modeling in "clean rooms".

    ??????, добавлен 26.06.2016

  • ?????????? Business Intelligence ??? ?????????? ??????? ? ????????, ??????? ???????? ?????? ??????-????????????? ???????? ?????? ?????????? ?? ????????????? ??????? ??????. ???????????? ????????????????? ??????????? ??????????? ???????? ????????????.

    ???????, добавлен 29.10.2017

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    ??????, добавлен 27.12.2016

  • ???????? ???????? ? ??????? ? ?? ??????? ?? ????????? SAP Business Planning and Consolidation on SAP Business Warehouse. ?????? ?????? ??????? ????????????. ?????? ? ?????? ??????????? ?????? ?????? ?? ?????? SAP High-Performance Analytical Appliance.

    ???????? ??????, добавлен 10.06.2015

  • Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.

    ??????? ???????, добавлен 25.11.2013

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    ?????, добавлен 08.03.2014

  • The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).

    ???????? ??????, добавлен 30.08.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.