Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Attack

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
Attempt to destroy, expose, disable, steal or gain unauthorized access and sensitive information.
Published in Chapter:
Toward More Resilient Cyber Infrastructure: A Practical Approach
Biljana Tanceska (Ministry of Defense, Macedonia), Mitko Bogdanoski (Military Academy “General Mihailo Apostolski”, Macedonia), and Aleksandar Risteski (University Ss. Cyril and Methodius, Macedonia)
DOI: 10.4018/978-1-4666-8793-6.ch015
Abstract
In this chapter, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The main goal of this chapter is to present the practical execution of various security attacks and their mitigation techniques due to more resilient cyber infrastructure. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of security attacks (Denial of Service, Man in the Middle, and Control Plane attacks) are observed in simulation scenarios with a detailed analysis on each of them, followed by a presentation of practical performance and ways of prevention (protection) against the attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
National Security Policy and Strategy and Cyber Security Risks
An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Information-Centric Networking
An attempt to gain unauthorized access to, steal, expose, alter, disable or destroy computing resources by unauthorized personnel or through unauthorized means.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Assessment of NPP I&C Systems
An attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
Something that causes potential harm and destroys a thing or affects a thing.
Full Text Chapter Download: US $37.50 Add to Cart
Virtualization as the Enabling Technology of Cloud Computing
It is an attempt to gain unauthorized access to, steal, expose, alter, disable or destroy computing resources by unauthorized personnel or through unauthorized means.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber-Physical Security in Healthcare
Attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset
Full Text Chapter Download: US $37.50 Add to Cart
Formal Analysis and Design of Authentication Protocols
An attack refers to the violation of the security goal of a system or a protocol. The term is commonly used to describe intentional (as opposed to accidental) violations, and involves an intruder actively (or passively) manipulating protocol messages and interactions with other participants.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR