期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2012
卷号:2
期号:11
出版社:S.S. Mishra
摘要:When we think of technology, what often comes to mind are televisions, communications devices such as cell phones and satellites, computers, and different modes of transportation. Various operational deliberations associated with "weaponizing" the basic t echnology of cyber attack. This paper is relevant both to the attacker, who uses cyber attack as a tool of his own choosing, and to the defender, who must handle with and respond to incoming cyber attacks launched by an attacker. However, there are other ways in which technology is applied, one of those being the Internet and its various components including email, chat rooms, and search engines. The list of uses for the Internet is innumerable and many corporations and universities are forcing people to make use of it. But no matter how much this new technology is forced on us, people are still resistant to it.
关键词:Cyber Attack; weapons; technology; network control; internet