Exploits in Information Security

Gul M., Aydin M. A.

24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16 - 19 May 2016, pp.1729-1732 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume:
  • Doi Number: 10.1109/siu.2016.7496093
  • City: Zonguldak
  • Country: Turkey
  • Page Numbers: pp.1729-1732


Almost the whole information that belongs to Goverment or private sector, Corporate or individual has been digitized currently. The computers which keep digitized information provides to use those information properly via applications such as database and web services. If necessary precautions hadn't been taken at individual or corporate level in both configuring network and applications, 'your information is not your own any more' can be said. In order to take necessary precautions, it will provide a great advantage to know the types of attacks and exploits and how they are made. In this perspective this paper is a survey about current attacks and exploits in which the types and how they exploit is explained with some basic examples.