Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable
نویسندگان
چکیده
منابع مشابه
Psychological Theories of Crime and Hacking
Today's society is in the midst of a technological revolution. With advances in computers and telecommunications most businesses and many individuals have become dependent on computers and networks to carry out everyday activities as of 1996 13 million hosts systems were accessing the Internet, and that by the year 2000, the number will have risen to over 200 million. The rush to embrace the ne...
متن کاملsecuBT : Hacking the Hackers with User-Space Virtualization
In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe execution framework for the execution of untrusted binary code based on the fastBT dynamic binary translator. secuBT implements user-space virtualization using dynamic binary translation and adds a system call interposition framework to limit and guard th...
متن کاملCognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that ...
متن کاملHacking Davidson
Scheme,” Donald Davidson argues against the logical possibility of conceptual schemes. Believing it a remnant of the incomplete eradication of dogma in the empiricist tradition, Davidson wishes to undermine what he believes is the source of talk of conceptual relativism: the third dogma of scheme-content duality. Building on Quine, he constructs an argument intended to illustrate the peculiar p...
متن کاملHacking Cyberspace
Knowledge about cyberspace is shaped and delimited by the questions we ask and the kinds of inquiries we pursue. Questioning, of course, is never objective or neutral. As Martin Heidegger demonstrates, a question, no matter how carefully articulated, necessarily harbors preconceptions and pre-understandings that direct and regulate inquiry (24). When we ask, for example, whether cyberspace port...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences
سال: 2016
ISSN: 1226-4717
DOI: 10.7840/kics.2016.41.4.489