Vulnerabilities and unauthorized results in cybercrime
| |

Vulnerabilities To get the results he want, an attacker must use a computer or network vulnerability, which is defined as follows: Vulnerability is a weakness of the system allowing unauthorized action. These are errors that occur in different stages of … Read More

Attacks and tools in cybercrime
| |

Attacks Sometimes, an event that occurs on a computer or network is part of a series of steps to produce an unauthorized event. This event is then considered as part of an attack. An attack has several elements. First, it … Read More

Online security events, actions, and targets
| |

Operation of computers and networks is composed of a series of events. An event is changing the state of a system or device. From information security point of view, these mood swings occur as a result of actions that are … Read More

Events, attacks and incidents for the security of online information
| |

Three basic security concepts are important in terms of information on the Internet: confidentiality, integrity and availability. The concepts related to people who use this information are authentication, authorization and acceptance. When the information is read and copied by someone … Read More

Classification of risks and incidents in cyberworld
| |

Classifications can be made according to several criteria. We will review some of them: Classification as a list of terms A popular but simplistic classification is a list of defined terms. An example is as follows: Cables and signals interception … Read More

Classification of cyber attackers according to their skills and objectives
| |

Another presentation identifies five categories of intruders, each with different skills, levels of knowledge, especially with different objectives. All these categories can come from both outside and inside the company. The novice is usually a lone rookie. No computer experience … Read More

Typologies of cyber attackers
| |

There have been numerous attempts to achieve a typology of perpetrators, their classification categories ranging from two to no more than 26. Criteria for delineation of these types are mainly two: the motivations of authors and their legal consequences. The … Read More

Cybercrime
| |

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, … Read More

The first attacks on the Internet
| |

November 2, 1988 is an important day for the Internet. On that day a graduate of Cornell University in the United States, Robert Morris Jr., executed a worm type program, the first program that has affected in a very serious … Read More

Cross-site scripting
| |

Cross-site scripting (XSS) is a computer vulnerability usually found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited … Read More

Cross-site request forgery
| |

Cross-site request forgery, also known as one click attack or session riding and abbreviated as CSRF (Sea-Surf) or XSRF, is a kind of malicious exploit of websites. Although this type of attack has similarities to cross-site scripting (XSS), cross-site scripting … Read More

Cross-site cooking
| |

In cross-site cooking, the attacker exploits a browser bug to send an invalid cookie to a server. Cross-site cooking is a type of browser exploit which allows a site attacker to set a cookie for a browser into the cookie … Read More

1 2