Event Title

Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy

Session

Information Systems and Security

Description

Trends and lately we know that most of the attack happens by planting on the systems, application or machines malicious code, which has the main target to destroy and steal information. The main objective of the paper is the identification of technologies which can detect and notify regarding possible infected system, application or machine with malicious code and working out analysis and recommendations to detect, prevent cyber-attacks. By knowing the real need for this category of the cyber-attacks malicious code, the research and analysis will consider using the ICT for having this mechanism which could help and reduce more than 50 % risks and cyber-attacks on national wide area.

Keywords:

Information System, cyber security, technologies

Session Chair

Anita Mirijamdotter

Session Co-Chair

Bejtush Ademi

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-69-1

Location

Pristina, Kosovo

Start Date

27-10-2018 9:00 AM

End Date

27-10-2018 10:30 AM

DOI

10.33107/ubt-ic.2018.207

This document is currently not available here.

Share

COinS
 
Oct 27th, 9:00 AM Oct 27th, 10:30 AM

Technologies that are needed to detect malicious code known as Automated Defense in Cyber Security & Privacy

Pristina, Kosovo

Trends and lately we know that most of the attack happens by planting on the systems, application or machines malicious code, which has the main target to destroy and steal information. The main objective of the paper is the identification of technologies which can detect and notify regarding possible infected system, application or machine with malicious code and working out analysis and recommendations to detect, prevent cyber-attacks. By knowing the real need for this category of the cyber-attacks malicious code, the research and analysis will consider using the ICT for having this mechanism which could help and reduce more than 50 % risks and cyber-attacks on national wide area.