IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hackers, Hacking, and Eavesdropping

Hackers, Hacking, and Eavesdropping
View Sample PDF
Author(s): Kevin Curran (University of Ulster, Ireland), Peter Breslin (University of Ulster, Ireland), Kevin McLaughlin (University of Ulster, Ireland)and Gary Tracey (University of Ulster, Ireland)
Copyright: 2008
Pages: 6
Source title: Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch029

Purchase

View Hackers, Hacking, and Eavesdropping on the publisher's website for pricing and purchasing information.

Abstract

"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.

Related Content

Nalini M.. © 2023. 22 pages.
Balachandar S., Chinnaiyan R.. © 2023. 19 pages.
V. A. Velvizhi, G. Senbagavalli, S. Malini. © 2023. 29 pages.
Amuthan Nallathambi, Kannan Nova. © 2023. 25 pages.
Amuthan Nallathambi, Sivakumar N., Velrajkumar P.. © 2023. 17 pages.
Nayana Hegde, Sunilkumar S. Manvi. © 2023. 18 pages.
Udayakumar K., Ramamoorthy S., Poorvadevi R.. © 2023. 26 pages.
Body Bottom