A review of Malware Classifications

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 329

متن کامل این مقاله منتشر نشده است و فقط به صورت چکیده یا چکیده مبسوط در پایگاه موجود می باشد.
توضیح: معمولا کلیه مقالاتی که کمتر از ۵ صفحه باشند در پایگاه سیویلیکا اصل مقاله (فول تکست) محسوب نمی شوند و فقط کاربران عضو بدون کسر اعتبار می توانند فایل آنها را دریافت نمایند.

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICTCK03_056

تاریخ نمایه سازی: 10 تیر 1396

چکیده مقاله:

Information systems are exposed to different types of security risks. The consequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical destruction of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats) classification and gives an overview of most common classifications used in literature and in practice.

نویسندگان

Maryam Shahpasand

dept. Network, Security and Forensic Asia Pacific University of Technology & Innovation (APU) Kuala Lumpur, Malaysia

Shewihdi Magdi

dept. Network, Security and Forensic Asia Pacific University of Technology & Innovation (APU)Kuala Lumpur, Malaysia