User contributions for Stef
Jump to navigation
Jump to search
- 17:42, 25 April 2008 diff hist +62 The future of cyber-warfare 2020 →Questions
- 17:41, 25 April 2008 diff hist +1,240 N What is the key recommendation of the National Strategy(US) to Secure Cyberspace? New page: The cornerstone of U.S. strategy is the implementation of a public-private partnership to secure cyberspace. "In general, the private sector is best equipped and structured to respond to a... current
- 17:40, 25 April 2008 diff hist +1,028 N What is malware? New page: Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a portmanteau of the words malicious and software. The expression is a ge... current
- 17:39, 25 April 2008 diff hist +25 The future of cyber-warfare 2020 →Questions
- 17:38, 25 April 2008 diff hist +1,055 N What is a trojan horse? New page: In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer... current
- 17:36, 25 April 2008 diff hist +1,867 N What is virus? New page: A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, t... current
- 17:34, 25 April 2008 diff hist +1,219 N What is the key recommendation of the National Strategy(US) to Secure Cyberspace?? New page: he cornerstone of U.S. strategy is the implementation of a public-private partnership to secure cyberspace. "In general, the private sector is best equipped and structured to respond to an... current
- 16:48, 25 April 2008 diff hist +92 The future of cyber-warfare 2020 →Questions
- 14:31, 25 April 2008 diff hist +57 The future of cyber-warfare 2020 →Questions
- 09:49, 25 April 2008 diff hist +590 N What is warfare? New page: War is any large scale, violent conflict. War grows from the almost universal tribal warfare that has occurred throughout history, to wars between city states, nations, or empires. By exte... current
- 13:42, 21 April 2008 diff hist +4 The future of cyber-warfare 2020 →Questions
- 13:39, 21 April 2008 diff hist +26 The future of cyber-warfare 2020 →Questions
- 13:35, 21 April 2008 diff hist −37 The future of cyber-warfare 2020 →Questions
- 13:34, 21 April 2008 diff hist +475 N What is Cyber-space? New page: <b>What is Cyber-space?</b><br><br> Cyber-space is the domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked sys...
- 13:33, 21 April 2008 diff hist +849 N What is Information warfare? New page: <b>What is Information warfare?</b><br><br> Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. In a war information about ...
- 13:33, 21 April 2008 diff hist +1,184 N What are the standard preventive security measures against a cyber attack? New page: <b>What are the standard preventive security measures against a cyber attack?</b><br><br> Since the internet boom security is a growing concern. Software developers got more an d more awa...
- 13:32, 21 April 2008 diff hist +530 N What is Cyber-crime? New page: <b>What is Cyber-crime?</b><br><br> A Cyber-crime is a crime in which a computer or network is an essential part of the crime. Examples of cyber-crimes are:<br> • Spamming<br> • Distri...
- 13:31, 21 April 2008 diff hist +1,177 N What kind of damage can a cyber-attack do? New page: <b>What kind of damage can a cyber-attack do?</b><br><br> A cyber-attack can inflict both direct and indirect damages. Directly it can break and disturb computer systems. Websites or serv...
- 13:31, 21 April 2008 diff hist +844 N Which kind people are involved in cyber-warfare? New page: Which kind people are involved in cyber-warfare?</b><br><br> The core people involved in cyber-warfare are the security experts. These are not the system administrators but the people who ...
- 13:30, 21 April 2008 diff hist +831 N What are the three aspects of security? New page: <b>What are the three aspects of security?</b><br><br> Security is based on 3 aspects: people, systems and procedures. They all need to be ordered and in place to become secure. It’s o...
- 13:30, 21 April 2008 diff hist +704 N What is a firewall? New page: <b>What is a firewall?</b><br><br> A firewall is an appliance or piece of software running on a computer that inspects all network traffic running through it. It’s often the door to the ...
- 13:29, 21 April 2008 diff hist +904 N What is a botnet? New page: <b>What is a botnet?</b><br><br> A botnet is a collection of software robots that run autonomously and automatically. They run on computers attached to the internet which are compromised b...
- 13:29, 21 April 2008 diff hist +1,036 N What is a DDoS attack? New page: <b>What is a DDoS attack?</b><br><br> A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a service unavailable for its user...
- 13:28, 21 April 2008 diff hist +40 The future of cyber-warfare 2020 →Questions
- 21:10, 20 April 2008 diff hist +37 The future of cyber-warfare 2020 →Questions
- 21:09, 20 April 2008 diff hist +25 N File:10Q&A Stef.doc 10 Questions&awnsers Stef current
- 19:51, 20 April 2008 diff hist +22 The future of cyber-warfare 2020 →Group Members
- 19:49, 20 April 2008 diff hist +431 The future of cyber-warfare 2020 →Questions