FEATURES OF INVESTIGATION OF MALICIOUS SOFTWARE AND TRACES OF REMOTE CONNECTIONS TO COMPUTER SYSTEM
Journal: International Scientific Journal "Internauka" (Vol.1, No. 94)Publication Date: 2020-09-30
Authors : Kolesnyk Vitalii; Pilipenko Oleksandr;
Page : 45-48
Keywords : computer forensics; malicious software; malware; unauthorized access to system;
Abstract
The article discusses the practical aspects of researching malicious software and identifying traces of unauthorized access to computer system.
Other Latest Articles
- PROBLEM ISSUES THAT MAY OCCUR DURING THE DEVELOPMENT OF A GENERAL TECHNIQUE OF RESEARCH OF MOBILE PHONES (SMARTPHONES)
- DESIGN OF AUTOMATED TRAINING AND PRODUCTION SYSTEM
- CREATING OF ONLINE EDUCATION PLATFORM USING CRM SYSTEM
- Mass-Circulation Newspapers in the Funds of V. I. Vernadsky National Library of Ukraine
- The Conference of European National Librarians (CENL) and International Federation of Library Associations (IFLA): Outlines of Strategic Plans in Developing Cooperation between National Libraries (2018–2022)
Last modified: 2021-04-16 19:08:02