Lecture notes on Computer and network security: Lecture 30 - Avinash Kak
Lecture notes on Computer and network security: Lecture 30 - Avinash Kak
Lecture 30: Mounting targeted attacks with trojans and social engineering - Cyber espionage. The goals of this chapter are: Can a well-engineered network be broken into? Socially engineered email lures, trojans and the gh0stRAT trojan, cyber espionage, exploiting browser vulnerabilities.