Reference Hub1
Computer System Attacks

Computer System Attacks

Zhang Ning
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch001
Cite Chapter Cite Chapter

MLA

Ning, Zhang. "Computer System Attacks." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 1-24. https://doi.org/10.4018/978-1-4666-4707-7.ch001

APA

Ning, Z. (2014). Computer System Attacks. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 1-24). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch001

Chicago

Ning, Zhang. "Computer System Attacks." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1-24. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch001

Export Reference

Mendeley
Favorite

Abstract

The study of computer system attacks is an important part RFID security and privacy. This chapter provides a general overview of computer system attacks organized by target. Attacks on EPC entities - tags, readers, middleware, and back-end systems - are categorized and discussed, as well as wired link attacks. Countermeasures to the attacks are summarized and evaluated based on the discussion. The Denial of Services (DoS) attack is highlighted in the discussion.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.