Vulnerabilities in Computer Systems

computer vulnerabilities, standards, cyber threats

Authors

  • Andreea-Ioana DRUMEANU
    andreea.drumeanu@gmail.com (Primary Contact)
    University Politehnica of Bucharest, Romania
2021-04-30

Downloads

Information systems vulnerabilities can appear under several different forms and at different levels in a smart office building or on a website, including at the level of a single device, system level, network level, application level, To the level of operation and management. In this business are 2 types of hackers, on a way are black hat hackers who intent to steal your data using malicious software and exploit vulnerabilities and on the other side are the white hat hackers who put their coding power for closing security breaches and perform security evaluations for companies.