IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Overview of Electronic Attacks

An Overview of Electronic Attacks
View Sample PDF
Author(s): Thomas M. Chen (Southern Methodist University, USA)and Chris Davis (Texas Instruments, USA)
Copyright: 2006
Pages: 26
Source title: Digital Crime and Forensic Science in Cyberspace
Source Author(s)/Editor(s): Panagiotis Kanellis (Information Society S.A., Greece), Evangelos Kiountouzis (Athens University, Greece), Nicholas Kolokotronis (Universitiy of Peloponnese, Greece)and Drakoulis Martakos (National and Kapodistrian University of Athens, Greece)
DOI: 10.4018/978-1-59140-872-7.ch001

Purchase

View An Overview of Electronic Attacks on the publisher's website for pricing and purchasing information.

Abstract

This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A comprehensive understanding of attackers, their motives, and their methods is a prerequisite for digital crime investigation. The range of possible cyber attacks is almost unlimited, but many attacks generally follow the basic steps of reconnaissance, gaining access, and cover-up. We highlight common methods and tools used by attackers in each step. In addition, attacks are not necessarily directed toward specific targets. Viruses, worms, and spam are examples of large-scale attacks directed at compromising as many systems as possible.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom