A Glance At Malicious Attacks In Web

Abstract

Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transactions, and also for entertainment. It serves as an attractive area for attackers too. Hence there is at most importance to protect our data that is being exposed in web against any sort of malicious attacks. Malware, short for malicious software is a software use to disrupt computer operation, gathers sensitive information or gain access to pri vate computer system. It can also appear in the form of code, scripts, acti ve content and other soft ware. Malware is different from different software which is legitimate software but contents harmful bugs that were not corrected before release.

Authors and Affiliations

Adithya S Kumar, Neethu S N, Deepthy Mathews

Keywords

Related Articles

A Novel Privacy-Preserving Mechanism That Supports Public Auditing On Shared Data Stored In The Cloud

Numerous use of cloud data e.g., data mining and machine learning do not unavoidablycall for users to download the entire cloud data to local devices. It is since cloud providers such as Amazon can proffer users calc...

Design of Low Power SAR-ADC in 0.18μm Mixed-Mode CMOS Process

This paper presents an energy efficient successive-approximation-register (SAR) analog-todigital converter (ADC) for biomedical applications.For low-power applications designer needs to come up with a compromise among...

CLUMARE: A GUI Based Tool for Clustering Multidimensional Datasets Using Map Reduce

chiranjeevi416@gmail.com, Srinivas2804@gmail.com, parisakishore@gmail.com

Effect Self Loop Avoidance Weighted NDFA Method Using Fuzzy Cache Counter Classifier Algorithm for Efficient and Fastest Reachable Path in Travelling Networks

Now a days in computer path networks or travelling networks, the routing of vehicles or moving objects is mainly based on the best path. This will help in minimize the costs of paths in a place, city or any specified...

The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones

The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity...

Download PDF file
  • EP ID EP27870
  • DOI -
  • Views 219
  • Downloads 0

How To Cite

Adithya S Kumar, Neethu S N, Deepthy Mathews (2014). A Glance At Malicious Attacks In Web. International Journal of Research in Computer and Communication Technology, 3(3), -. https://www.europub.co.uk/articles/-A-27870