Repository logo
Communities & Collections
Research Outputs
Fundings & Projects
People
Statistics
User Manual
Have you forgotten your password?
  1. Home
  2. Faculty of Computer Science and Engineering
  3. Faculty of Computer Science and Engineering: Journal Articles
  4. Approaching a DoS attack using change and risk management methods
Details

Approaching a DoS attack using change and risk management methods

Journal
Security & Future
Date Issued
2020
Author(s)
Pavlov, Stefan
Antovski, Ljupco
Abstract
The Information Technology security threats are emerging with each day passing by. The implementation of the technology into
every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the
risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these
kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is
around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack,
we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are
implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals
and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices
(mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data.
Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already
occurred impact, but also to prevent these types of failures from happening in the future.
Subjects

CHANGE, RISK, SECURIT...

File(s)
Loading...
Thumbnail Image
Name

confsec-2020-2-64 Approaching a DoS attack using change and risk management methods.pdf

Size

744.6 KB

Format

Adobe PDF

Checksum

(MD5):675eb2cbf04d287c6b4de22fd6692e17

⠀

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Accessibility settings
  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify