Computer security: theory, process and management
Journal of Computing Sciences in Colleges
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
Developing and enhancing a computer and network security curriculum
Journal of Computing Sciences in Colleges
Proceedings of the 6th conference on Information technology education
Hi-index | 0.00 |
Computer security is a growing concern for many personal computer owners. Cyber crime has been on a constant rise. Many home computer owners don't realize that they need to pay attention to computer security very closely. This paper describes an investigation on both sides of a cyber attack. We measure the activities of a computer's inner workings while it is under attack. The intent is to reveal indications that an intrusion has occurred by showing events that occur when a personal computer user's password has been hacked. With this gained knowledge, a system can be put in place that can alert the user that his/her computer is under an attack. The main goal is to design a system that is easy for any novice computer user to use.