Techniques of infection propagation
rating-star-empty rating-star-empty rating-star-empty rating-star-empty rating-star-empty

price

FREE

Language

English

Year of publication

2024

created with support of

Co-funded by the European Union. The views and opinions expressed are those of the authors and do not necessarily reflect those of the European Union or the Czech National Agency for International Education and Research. Neither the European Union nor the grant provider is responsible for them.

Techniques of infection propagation
Techniques of infection propagation

Authors

Beatriz Otero, Eva Rodríguez, Jordi Salazar, Santiago Silvestre, Francesc Torres

Abstract

The study of computer security entails acquiring knowledge about and categorizing the most common infection propagation techniques, as well as understanding the exploitation of security vulnerabilities, both local and remote. It is essential to understand the main software exploitation mechanisms, such as stack and buffer overflows, as well as heap overflows. Additionally, software and hardware infection techniques should be investigated to be prepared for potential attacks. Finally, being aware of the main attacks resulting from social engineering is crucial, as these can compromise the security of computer systems.

license

Creative Commons BY-SA 4.0

Language

English

Year of publication

2024

price

FREE

Learning materiatls

other sources - mind map

created with support of

Co-funded by the European Union. The views and opinions expressed are those of the authors and do not necessarily reflect those of the European Union or the Czech National Agency for International Education and Research. Neither the European Union nor the grant provider is responsible for them.