Malicious attacks
Categories: none
Software errors and malfunctions can occur due to mistakes, accidents or random events. However, in an interconnected world, websites and other systems are often accessible to the entire world. Inevitably, some of those people will have malicious or criminal intent.
This topic looks at the likely targets of malicious users (ie what they are attempting to damage or steal), and the sort of attacks they might use (and how to defend against them). First we look at some basic concepts of security.
See also
Sign up to the Creative Coding Newletter
Join my newsletter to receive occasional emails when new content is added, using the form below:
Popular tags
555 timer abstract data type abstraction addition algorithm and gate array ascii ascii85 base32 base64 battery binary binary encoding binary search bit block cipher block padding byte canvas colour coming soon computer music condition cryptographic attacks cryptography decomposition decryption deduplication dictionary attack encryption file server flash memory hard drive hashing hexadecimal hmac html image insertion sort ip address key derivation lamp linear search list mac mac address mesh network message authentication code music nand gate network storage none nor gate not gate op-amp or gate pixel private key python quantisation queue raid ram relational operator resources rgb rom search sort sound synthesis ssd star network supercollider svg switch symmetric encryption truth table turtle graphics yenc