Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23896
DC FieldValueLanguage
dc.contributor.authorPavlov, Stefanen_US
dc.contributor.authorDimitrova, Vesnaen_US
dc.contributor.authorAntovski, Ljupcoen_US
dc.date.accessioned2022-10-28T08:29:41Z-
dc.date.available2022-10-28T08:29:41Z-
dc.date.issued2020-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23896-
dc.description.abstractThe Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.en_US
dc.publisherScientific Technical Union of Mechanical Engineering" Industry 4.0"en_US
dc.relation.ispartofSecurity & Futureen_US
dc.subjectCHANGE, RISK, SECURITY, DATAen_US
dc.titleApproaching a DoS attack using change and risk management methodsen_US
dc.typeArticleen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Description SizeFormat 
confsec-2020-2-64 Approaching a DoS attack using change and risk management methods.pdf744.6 kBAdobe PDFView/Open
Show simple item record

Page view(s)

40
checked on May 22, 2024

Download(s)

4
checked on May 22, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.