Vulnerabilities in Computer Systems
Downloads
Information systems vulnerabilities can appear under several different forms and at different levels in a smart office building or on a website, including at the level of a single device, system level, network level, application level, To the level of operation and management. In this business are 2 types of hackers, on a way are black hat hackers who intent to steal your data using malicious software and exploit vulnerabilities and on the other side are the white hat hackers who put their coding power for closing security breaches and perform security evaluations for companies.
Downloads
***, Juridice. [Online]. Available: https://www.juridice.ro/412111/vulnerabilitati-alesistemelor-informatice.html.
***, Ghid introductiv pentru aplicarea dispozițiilor legale referitoare la criminalitatea informatic, Bucureşti, 2004.
Today Software Magazine, [Online]. Available: https://www.todaysoftmag.ro/article/2357/managementul-vulnerabilitatilor-si-evaluarea-riscurilor-in-domeniul-securitatiiinformatice.
ANIS, [Online]. Available: https://www.anis.ro/top-10-vulnerabilitati-care-pot-apareaintr-un-sistem-informatic.




