Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23956
Title: Approaching a DoS attack using change and risk management methods
Authors: Pavlov, Stefan
Dimitrova, Vesna 
Antovski, Ljupco
Keywords: CHANGE, RISK, SECURITY, DATA
Issue Date: 2020
Publisher: Scientific Technical Union of Mechanical Engineering" Industry 4.0"
Journal: Security & Future
Abstract: The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.
URI: http://hdl.handle.net/20.500.12188/23956
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles

Files in This Item:
File Description SizeFormat 
confsec-2020-2-64 Approaching a DoS attack using change and risk management methods.pdf744.6 kBAdobe PDFView/Open
Show full item record

Page view(s)

24
checked on Apr 28, 2024

Download(s)

3
checked on Apr 28, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.