
Autoři
Beatriz Otero, Eva Rodríguez, Jordi Salazar, Santiago Silvestre, Francesc Torres
Anotace
The study of computer security entails acquiring knowledge about and categorizing the most common infection propagation techniques, as well as understanding the exploitation of security vulnerabilities, both local and remote. It is essential to understand the main software exploitation mechanisms, such as stack and buffer overflows, as well as heap overflows. Additionally, software and hardware infection techniques should be investigated to be prepared for potential attacks. Finally, being aware of the main attacks resulting from social engineering is crucial, as these can compromise the security of computer systems.
licence
Creative Commons BY-SA 4.0
Jazyk
anglicky
rok vzniku
2024
cena
ZDARMA
Výukové materiály
vzniklo za podpory

This project has been funded with support from the European Commission. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.