{"title":"恶意软件对互联网的影响","authors":"Adam Stojałowski","doi":"10.5604/01.3001.0053.8020","DOIUrl":null,"url":null,"abstract":"The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"234 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE IMPACT OF MALWARE ON THE INTERNET\",\"authors\":\"Adam Stojałowski\",\"doi\":\"10.5604/01.3001.0053.8020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.\",\"PeriodicalId\":269616,\"journal\":{\"name\":\"Cybersecurity & Cybercrime\",\"volume\":\"234 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity & Cybercrime\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0053.8020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity & Cybercrime","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0053.8020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.