IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Port Scans

Port Scans
View Sample PDF
Author(s): Jalal Kawash (American University of Sharjah, UAE)
Copyright: 2007
Pages: 7
Source title: Encyclopedia of Information Ethics and Security
Source Author(s)/Editor(s): Marian Quigley (Monash University, Australia)
DOI: 10.4018/978-1-59140-987-8.ch078

Purchase

View Port Scans on the publisher's website for pricing and purchasing information.

Abstract

The hardest task for a hacker is to get a foothold into a computer network system. If the hacker manages to get inside, the rest of the network is easily conquered. This is often referred to as the ‘eggshell principle’. It is hard to pierce in, but once inside, the whole network can be available for the hacker’s grab.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom