The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Attackers: Internal and External
Abstract
Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or unaware employee that clicks on a link that infects a computer or a network, to the security expert working for a criminal, military, or terrorist organization attacking a critical information infrastructure. This chapter examines the various classes of potential attackers and the techniques currently used to perpetrate such attacks.
Related Content
Christopher Nyakotyo, Pedzisai Goronga.
© 2024.
18 pages.
|
Colleen Halupa.
© 2024.
23 pages.
|
Stefan Handke.
© 2024.
14 pages.
|
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla.
© 2024.
19 pages.
|
Ahmad Kayaly.
© 2024.
20 pages.
|
Elizabeth Stroble.
© 2024.
15 pages.
|
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane.
© 2024.
20 pages.
|
|
|