Features of multifunctional Backdoor technology in the personal space of users.

Keywords: backdoor, authentication, unauthorized access, cryptosystem.

Abstract

The article considers the problem of backdoor as a method of bypassing standard authentication procedures, unauthorized remote access to a computer, gaining access to plaintext, and so on, while remaining unnoticed. Modern forms and functions of backdoor invasion are analyzed..

References

Addicott J. Cyberterrorism: Legal Policy Issues / Jeffrey F. Addicott // Legal Issues in the Struggle against Terrorism / ed. by John N. Moore, Robert F. Turner. – Durham, Carolina Academic Press, 2010. – Р. 592.

Butuzov V.M. Countering computer crime: some aspects of international experience (on the example of law enforcement agencies of the United States and Germany) / V.M. Butuzov // Information security: man, society, state. - 2009. - No 1. - P. 30–38.

Cyber Cold War Looming for U.S. // USA Today [Electronic resource]. – Access mode: http://www.questia.com/library/1G1- 245805413/cyber-cold-war-looming-for-u-s

Dubov D. Strategic aspects of cybersecurity of Ukraine / D. Dubov // Strategic priorities. - 2013. - No 4. - P. 119–126.

Manzhay O.V. The use of cyberspace in operational and investigative activities / O.V. Manzhay // Law and Security. Scientific journal. - 2009. - No 4. - P. 142–149.

Marchenko A.V. Social consequences of cyberterrorist danger in the era of information technology / A.V. Marchenko // Methodology, theory and practice of sociological analysis of modern society: collection. Science. works Kharkiv. nat. V.N. Karazin University. - 2008. - No 1. - P. 355–360.

Hildreth SA Cyberterrorism: Materials of the Congress Research Service // Cyberwar: Report of the Congress Research Service RL30735 / SA Hildreth [Electronic resource]. - Access mode: http://www.infousa.ru/information/bt-1028.htm.

Abstract views: 0
PDF Downloads: 0
Published
2020-09-24
How to Cite
Martsenyuk, V., Sverstiuk А., Andrushchak, I., Sivakovska О., & PoteichukМ. (2020). Features of multifunctional Backdoor technology in the personal space of users . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (40), 123-127. https://doi.org/10.36910/6775-2524-0560-2020-40-19
Section
Computer science and computer engineering