Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
The Cybercriminal’s Toolkits 215
infected computers, which run automated tasks for cybercriminals, are com-
monly known as zombies. Attackers mainly target computers that have broad-
band access to Internet and a low level of security.
The main vectors of infection are the placement of an executable code
downloaded by a Trojan, through e-mails, or via a malicious website. Bots
also propagate by mass scanning to nd vulnerabilities in services. The hacker
perpetrates the infection and the attack without the user’s knowledge. As men-
tioned above, the hacker can run thousands of bot computers to launch DoS
attacks. He can attack such targets as an e-commerce organization which
allows on-line payments and money transfers, or online auction companies. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048