Ethical and Social Issues in the Information Age by Joseph Migga Kizza
Author:Joseph Migga Kizza
Language: eng
Format: epub, pdf
Publisher: Springer International Publishing, Cham
9.3 Types of Computer Systems Attacks
A great number of computer system crimes are actually computer attacks . Major computer attacks fall into two categories: penetration and denial of service attacks.
9.3.1 Penetration
A penetration attack involves breaking into a computer system using known security vulnerabilities to gain access to a cyberspace resource. With full penetration, an intruder has full access to all that system’s resources. Full penetration, therefore, allows an intruder to alter data files, change data, plant viruses , or install damaging Trojan horse programs into the system. It is also possible for intruders—especially if the victim computer is on a network—to use it as a launching pad to attack other network resources. Penetration attacks can be local, where the intruder gains access to a computer on a LAN on which the program is run, or global on a WAN like the Internet , where an attack can originate thousands of miles from the victim computer. Penetration attacks originate from many sources including:1. Insider Threat. For a long time, penetration attacks were limited to in-house employee-generated attacks to systems and theft of company property. In fact, disgruntled current or former employee, contractor, or other business partners are a major source of computer crimes because they do not need a great deal of knowledge about the victim computer system. In many cases, such insiders use the system everyday. This allows them to gain unrestricted access to the computer system, thus causing damage to the system and/or data. Mirko Zoriz [4] reports that organizations globally believe they are their own worst enemy when it comes to cyber security, with 45% saying they are ill-equipped to cope with the threat of malicious insiders and twice as many, 90%, calling malicious insiders a major threat to the organizations’ security.
Download
Ethical and Social Issues in the Information Age by Joseph Migga Kizza.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Tools of Titans by Timothy Ferriss(7803)
Change Your Questions, Change Your Life by Marilee Adams(7367)
Deep Work by Cal Newport(6560)
Man-made Catastrophes and Risk Information Concealment by Dmitry Chernov & Didier Sornette(5641)
Playing to Win_ How Strategy Really Works by A.G. Lafley & Roger L. Martin(5485)
Digital Minimalism by Cal Newport;(5388)
Big Magic: Creative Living Beyond Fear by Elizabeth Gilbert(5347)
The Slight Edge by Jeff Olson(5198)
The Motivation Myth by Jeff Haden(4996)
Ego Is the Enemy by Ryan Holiday(4948)
Stone's Rules by Roger Stone(4852)
The Laws of Human Nature by Robert Greene(4769)
Tuesdays with Morrie by Mitch Albom(4390)
Rising Strong by Brene Brown(4190)
Eat That Frog! by Brian Tracy(4147)
Skin in the Game by Nassim Nicholas Taleb(3964)
The Money Culture by Michael Lewis(3840)
Bullshit Jobs by David Graeber(3825)
Skin in the Game: Hidden Asymmetries in Daily Life by Nassim Nicholas Taleb(3719)
