KASLIK HOLY SPIRIT UNIVERSITYFaculty of EngineeringDepartment of Computer EngineeringNO TO COMPUTER HACKINGPractical work in computer science and resourcesSpecialization: Computer EngineeringPrepared by Georgio HatemUnder the direction of Sister Aïda NakhléKaslik-LebanonApril 2014IndexIntroduction: 41. What is computer hacking? 42. What is a hacker? 43. Threats of assault. 54. Defense against attack. 55. Practical cases. 5Conclusion: 5Bibliography: 6Introduction:The excessive expansion of the Internet in recent times has been the cause of the appearance of delinquent movements. Computer hacking is a popular example. Quite simply, it is the illegal use of a computer. It is divided into different categories and actors and threatens society. Who carries out computer hacking and by what means, what are the motivations of those who carry it out and what are the consequences of these movements on society? We will be led to question ourselves about computer hacking techniques and its actors, about threats and...... medium of paper ......and sectors. This is why we are researching a new technology capable of defending information from hacking and the Cloud was the result. But does this technology offer us complete protection against attacks? BibliographyAXELSSON, S. (2000).”The Base-Rate Fallacy and the Difficulty of Intrusion Detection”. ACM Transaction on Information and System Security, vol.3, n˚3, p 186-205.BILLARGEON-AUDET,K. (2010). Computer Hacking: Case Study of a Network of Computer Hackers in Quebec, Master's thesis submitted to the School of Criminology of the University of Montreal BELLIA, PL (2001). “Chasing Bits Across Borders,” University of Chicago Legal Forum, p35-101. www.symantec.com/region/fr/resources/pirate2.html http://www.lest-eclair.fr/zoom-sur/comment-faire-face-au-piratage-informatique-ia0b0n176061
tags