Exploits in Information Security


Gul M., Aydin M. A.

24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Türkiye, 16 - 19 Mayıs 2016, ss.1729-1732 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası:
  • Doi Numarası: 10.1109/siu.2016.7496093
  • Basıldığı Şehir: Zonguldak
  • Basıldığı Ülke: Türkiye
  • Sayfa Sayıları: ss.1729-1732
  • İstanbul Üniversitesi Adresli: Evet

Özet

Almost the whole information that belongs to Goverment or private sector, Corporate or individual has been digitized currently. The computers which keep digitized information provides to use those information properly via applications such as database and web services. If necessary precautions hadn't been taken at individual or corporate level in both configuring network and applications, 'your information is not your own any more' can be said. In order to take necessary precautions, it will provide a great advantage to know the types of attacks and exploits and how they are made. In this perspective this paper is a survey about current attacks and exploits in which the types and how they exploit is explained with some basic examples.