1. Science
  2. Publications
  3. Information Processing Systems
  4. 3(84)'2010
  5. Uses programs of remote administration for unauthorized access to information resources

Uses programs of remote administration for unauthorized access to information resources

V.V. Kalchenko, M.V. Tsuranov
Annotations languages:

The methods of intruders in an information system using software for remote administration. A classification of threats to remote access, an analysis of possible errors when installing programs for remote administration. Consider ways to install hidden programs for remote administration and methods to counter this threat.
Keywords: program of remote access, unauthorized access, remote administration, the threat of information