A Study and analysis of attacks by exploiting the source code against computer systems

Document Type : Review articles


Department of Law Affairs, Baghdad University Presidency, University of Baghdad, Iraq


An avalanche of threats from malicious used information and communication technologies (ICT) ‎in political, military, economic and social affairs led to a deep awareness of the fact that new ‎technologies may pose additional risks to international peace and safety. Thus, the problem of ‎international information security, that is, the state of the spread of information among the ‎countries of the world, with which excludes the possibility of violation of the rights of the ‎individual and users in various state agencies and in all fields of knowledge. In the field of ‎knowledge, as well as destructive and illegal impact on elements of the national critical ‎information infrastructure, became an integral part of international security as a system of ‎international relations based on the observance by all states of generally recognized principles and ‎norms of international law and excluding the solution of controversial questions and ‎disagreements between them through force or threat of force, in general. Thus, the principles of ‎international security providing for promoting peaceful coexistence, being ensuring equal security ‎for all states, the creation of effective guarantees in the military, political, economic and ‎humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign ‎rights of every people, fair political settlement of international crises and regional conflicts ‎certainly include the creation of a system of international information security. At the same time, ‎under the IIB system, designed for countering threats to strategic stability and ensuring equal ‎partnership in the global digital environment, we understand the totality international and ‎national norms and institutions, chief among which are the UN Regulated activities of various ‎actors worldwide.‎


[1] D. Airehrour, Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing
a User-Reflective Mitigation Model, mdpi, Information 2018, 9, 110; DOI:10.3390/info9050110.
[2] Anatomy of an attack, available online: http://blogs.rsa.com/anatomy-of-an-attack/, last accessed on 2013.
[3] T. Huang and Y. Zhao, Revolution of securities law in the Internet age: A review on equity crowd-funding,
Comput. Law Secur. Rev., 33(6), 2017, pp. 802810
[4] T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer,Social phishing, Communications of the ACM, 50(10) 2007
[5] D. JAVAHERI, Detection and Elimination of Spyware and Ransom ware by Intercepting Kernel-Level System
Routines, IEEE, 6, 2018.
[6] K. Krombholz, Advanced Social Engineering Attacks, Preprint submitted to Journal of Information Security and
Applications, Journal of Information Security and Applications, 2014, DOI: 10.1016/j.jisa.2014.09.005.
[7] Dr. G. Padmavathi and D. Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless
Sensor Networks, International Journal of Computer Science and Information Security, 4(1&2), 2009.
[8] PriceWaterhouseCoopers. Adjusting the Lens on Economic Crime; PriceWaterhouseCoopers (PWC): Auckland,New Zealand, 2016.[9] S. Suman and Shubhangi, A Survey On Comparison Of Secure Routing Protocols in Wireless Sensor Networks,
International Journal of Wireless Communications and Networking Technologies, 5(3), April - May 2016.
[10] US Department of the Treasury. Financial Services Sector-Specific Plan; US Department of the Treasury: New
York, NY, USA, 2015.
[11] G. L. White, Education and prevention relationships on security incidents for home computers, J. Comput. Inf.
Syst., 55(3), 2015, pp. 29-37.
[12] K. Xing, S. S. R. Srinivasan, M Rivera, J. Li and X. Cheng, Attacks and Countermeasures in Sensor Networks:
A Survey, Network security, Springer, 2005.
Volume 12, Special Issue
December 2021
Pages 415-424
  • Receive Date: 14 April 2021
  • Revise Date: 24 May 2021
  • Accept Date: 10 June 2021