IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Attackers: Internal and External

Attackers: Internal and External
View Sample PDF
Author(s): Eduardo Gelbstein (Webster University, Switzerland)
Copyright: 2012
Pages: 18
Source title: Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Source Author(s)/Editor(s): Pauline C. Reich (Waseda University, Japan)and Eduardo Gelbstein (Webster University, Switzerland)
DOI: 10.4018/978-1-61520-831-9.ch004

Purchase

View Attackers: Internal and External on the publisher's website for pricing and purchasing information.

Abstract

Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or unaware employee that clicks on a link that infects a computer or a network, to the security expert working for a criminal, military, or terrorist organization attacking a critical information infrastructure. This chapter examines the various classes of potential attackers and the techniques currently used to perpetrate such attacks.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom