A Study and analysis of attacks by exploiting the source code against computer systems

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 90

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJNAA-12-0_031

تاریخ نمایه سازی: 11 آذر 1401

چکیده مقاله:

An avalanche of threats from malicious used information and communication technologies (ICT) ‎in political, military, economic and social affairs led to a deep awareness of the fact that new ‎technologies may pose additional risks to international peace and safety. Thus, the problem of ‎international information security, that is, the state of the spread of information among the ‎countries of the world, with which excludes the possibility of violation of the rights of the ‎individual and users in various state agencies and in all fields of knowledge. In the field of ‎knowledge, as well as destructive and illegal impact on elements of the national critical ‎information infrastructure, became an integral part of international security as a system of ‎international relations based on the observance by all states of generally recognized principles and ‎norms of international law and excluding the solution of controversial questions and ‎disagreements between them through force or threat of force, in general. Thus, the principles of ‎international security providing for promoting peaceful coexistence, being ensuring equal security ‎for all states, the creation of effective guarantees in the military, political, economic and ‎humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign ‎rights of every people, fair political settlement of international crises and regional conflicts ‎certainly include the creation of a system of international information security. At the same time, ‎under the IIB system, designed for countering threats to strategic stability and ensuring equal ‎partnership in the global digital environment, we understand the totality international and ‎national norms and institutions, chief among which are the UN Regulated activities of various ‎actors worldwide.‎

کلیدواژه ها:

Source Code ، DNS Spoofing ، DoS (Denial of Service)‎

نویسندگان

- -

Department of Law Affairs, Baghdad University Presidency, University of Baghdad, Iraq