Abstract
This article describes the illegal invasion of computer systems, mainstream means of hidden Trojan horse property, describe the characteristics of several types of malicious code, and stressed the importance of computer information system security. Describe the basic idea of the invasion of the system means, mostly utilize the loopholes of the software vulnerability or system loophole, or inject malicious code to the target system, and then elevated privileges to obtain information, or undermine the data of the system. List several elements of the computer information system security, and stressed the importance of cryptographic algorithm as the core of secure communication protocols in computer communications. Explain the characteristics of public key cryptography, introduce RSA encryption algorithm as the example of it. Through the analysis of the security elements, hold out the methods of precautions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
PiJu L (2008) RSA encryption algorithm, vol 1, Silicon Valley, pp 22–23
Dagan L (2010) Hazards and analysis web page malicious code, vol 21, Silicon Valley, pp 176–177
Jianing W (2009) Hazards and analysis of web page malicious code intrusion. Knowl Econ 15:106–107
Tao S (2011) Invasion and clear technologies of Trojan. Inf Comput 11:61–63 (theory edtion)
Yuchen W (2001) Principle of system vulnerabilities and common attack methods. Comput Sci Technol 3:62–64
Jian X (2011) Analyse the prevention system of intrusion. Comput Knowl Technol 3(2):98–107
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Zhang, K. (2013). Illegal Invasion of Computer Information Systems. In: Du, W. (eds) Informatics and Management Science V. Lecture Notes in Electrical Engineering, vol 208. Springer, London. https://doi.org/10.1007/978-1-4471-4796-1_22
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4796-1_22
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4795-4
Online ISBN: 978-1-4471-4796-1
eBook Packages: EngineeringEngineering (R0)