Study of Computer Crime, Cyber Attacks & Terrorism

Continues for 5 more pages »
Read full document

Study of Computer Crime, Cyber Attacks & Terrorism

By | November 2012
Page 1 of 6
Study of Computer Crime, Cyber Attacks & Terrorism

Disaster Recovery

Concepts of Information Systems Security
Information security means protecting information and information systems from unlawful access, use, confession, disturbance, alteration, glance, examination, recording or demolition. The conditions information security, computer security and information assurance are commonly used identically. These meadows are unified often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some slight differences between them. Nevertheless, a network attack can be distinct as any technique, procedure, or means used to unkindly try to compromise network security. “Clearly, no single, comprehensive solution to the security issues associated with WLANs exists today. Equally clear is that recognition of these problems is widespread, and that both standards bodies and industry vendors are working to develop effective solutions”. Dixie, B. (2010) there are a number of grounds that an individual would want to attack corporate networks. The folks performing network attacks are usually known as network attackers, hackers, or crackers. A small number of dissimilar types of spiteful activities that network attackers and hackers perform are: •Illegally using user accounts and privileges

Stealing hardware
Stealing software
Running code to damage systems
Running code to damage and corrupt data
Modifying stored data
Individuals seeking reputation or some sort of acknowledgment typically seek some form of reputation when they challenge to crash Web sites and other public objects on the Internet. There are some network attackers that purely take pleasure in the challenge of trying to compromise highly secured networks’ security systems. These types of attackers simply see their actions as a means of revealing existing security vulnerabilities.

Malicious Attacks,...

Rate this document

What do you think about the quality of this document?

Share this document

Let your classmates know about this document and more at