Skip to main content

Illegal Invasion of Computer Information Systems

  • Conference paper
  • First Online:
Informatics and Management Science V

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 208))

  • 1041 Accesses

Abstract

This article describes the illegal invasion of computer systems, mainstream means of hidden Trojan horse property, describe the characteristics of several types of malicious code, and stressed the importance of computer information system security. Describe the basic idea of the invasion of the system means, mostly utilize the loopholes of the software vulnerability or system loophole, or inject malicious code to the target system, and then elevated privileges to obtain information, or undermine the data of the system. List several elements of the computer information system security, and stressed the importance of cryptographic algorithm as the core of secure communication protocols in computer communications. Explain the characteristics of public key cryptography, introduce RSA encryption algorithm as the example of it. Through the analysis of the security elements, hold out the methods of precautions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. PiJu L (2008) RSA encryption algorithm, vol 1, Silicon Valley, pp 22–23

    Google Scholar 

  2. Dagan L (2010) Hazards and analysis web page malicious code, vol 21, Silicon Valley, pp 176–177

    Google Scholar 

  3. Jianing W (2009) Hazards and analysis of web page malicious code intrusion. Knowl Econ 15:106–107

    Google Scholar 

  4. Tao S (2011) Invasion and clear technologies of Trojan. Inf Comput 11:61–63 (theory edtion)

    Google Scholar 

  5. Yuchen W (2001) Principle of system vulnerabilities and common attack methods. Comput Sci Technol 3:62–64

    Google Scholar 

  6. Jian X (2011) Analyse the prevention system of intrusion. Comput Knowl Technol 3(2):98–107

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Zhang, K. (2013). Illegal Invasion of Computer Information Systems. In: Du, W. (eds) Informatics and Management Science V. Lecture Notes in Electrical Engineering, vol 208. Springer, London. https://doi.org/10.1007/978-1-4471-4796-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4796-1_22

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4795-4

  • Online ISBN: 978-1-4471-4796-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics