IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Attackers: Internal and External

Attackers: Internal and External
View Sample PDF
Author(s): Eduardo Gelbstein (Webster University, Switzerland)
Copyright: 2014
Pages: 18
Source title: Crisis Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-4707-7.ch028

Purchase

View Attackers: Internal and External on the publisher's website for pricing and purchasing information.

Abstract

Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or unaware employee that clicks on a link that infects a computer or a network, to the security expert working for a criminal, military, or terrorist organization attacking a critical information infrastructure. This chapter examines the various classes of potential attackers and the techniques currently used to perpetrate such attacks.

Related Content

Christopher Nyakotyo, Pedzisai Goronga. © 2024. 18 pages.
Colleen Halupa. © 2024. 23 pages.
Stefan Handke. © 2024. 14 pages.
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla. © 2024. 19 pages.
Ahmad Kayaly. © 2024. 20 pages.
Elizabeth Stroble. © 2024. 15 pages.
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane. © 2024. 20 pages.
Body Bottom