Abstract

The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call