Title of article :
A study and analysis of attacks by exploiting the source code against computer systems
Author/Authors :
Badrulddin, Ahmed Department of Law Affairs - Baghdad University Presidency - University of Baghdad, Iraq
Pages :
10
From page :
415
To page :
424
Abstract :
An avalanche of threats from malicious used information and communication technologies (ICT) in political, military, economic and social affairs led to a deep awareness of the fact that new technologies may pose additional risks to international peace and safety. Thus, the problem of international information security, that is, the state of the spread of information among the countries of the world, with which excludes the possibility of violation of the rights of the individual and users in various state agencies and in all fields of knowledge. In the field of knowledge, as well as destructive and illegal impact on elements of the national critical information infrastructure, became an integral part of international security as a system of international relations based on the observance by all states of generally recognized principles and norms of international law and excluding the solution of controversial questions and disagreements between them through force or threat of force, in general. Thus, the principles of international security providing for promoting peaceful coexistence, being ensuring equal security for all states, the creation of effective guarantees in the military, political, economic and humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign rights of every people, fair political settlement of international crises and regional conflicts certainly include the creation of a system of international information security. At the same time, under the IIB system, designed for countering threats to strategic stability and ensuring equal partnership in the global digital environment, we understand the totality international and national norms and institutions, chief among which are the UN Regulated activities of various actors worldwide.
Keywords :
Source Code , DNS Spoofing , DoS (Denial of Service)
Journal title :
International Journal of Nonlinear Analysis and Applications
Serial Year :
2021
Record number :
2700667
Link To Document :
بازگشت