Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy
Session
Information Systems and Security
Description
Trends and lately we know that most of the attack happens by planting on the systems, application or machines malicious code, which has the main target to destroy and steal information. The main objective of the paper is the identification of technologies which can detect and notify regarding possible infected system, application or machine with malicious code and working out analysis and recommendations to detect, prevent cyber-attacks. By knowing the real need for this category of the cyber-attacks malicious code, the research and analysis will consider using the ICT for having this mechanism which could help and reduce more than 50 % risks and cyber-attacks on national wide area.
Keywords:
Information System, cyber security, technologies
Session Chair
Anita Mirijamdotter
Session Co-Chair
Bejtush Ademi
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-69-1
Location
Pristina, Kosovo
Start Date
27-10-2018 9:00 AM
End Date
27-10-2018 10:30 AM
DOI
10.33107/ubt-ic.2018.207
Recommended Citation
Buja, Atdhe, "Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy" (2018). UBT International Conference. 207.
https://knowledgecenter.ubt-uni.net/conference/2018/all-events/207
Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy
Pristina, Kosovo
Trends and lately we know that most of the attack happens by planting on the systems, application or machines malicious code, which has the main target to destroy and steal information. The main objective of the paper is the identification of technologies which can detect and notify regarding possible infected system, application or machine with malicious code and working out analysis and recommendations to detect, prevent cyber-attacks. By knowing the real need for this category of the cyber-attacks malicious code, the research and analysis will consider using the ICT for having this mechanism which could help and reduce more than 50 % risks and cyber-attacks on national wide area.