Concepts of Information Systems Security
Information security means protecting information and information systems from unlawful access, use, confession, disturbance, alteration, glance, examination, recording or demolition. The conditions information security, computer security and information assurance are commonly used identically. These meadows are unified often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some slight differences between them. Nevertheless, a network attack can be distinct as any technique, procedure, or means used to unkindly try to compromise network security. “Clearly, no single, comprehensive solution to the security issues associated with WLANs exists today. Equally clear is that recognition of these problems is widespread, and that both standards bodies and industry vendors are working to develop effective solutions”. Dixie, B. (2010) there are a number of grounds that an individual would want to attack corporate networks. The folks performing network attacks are usually known as network attackers, hackers, or crackers. A small number of dissimilar types of spiteful activities that network attackers and hackers perform are:
• Illegally using user accounts and privileges
• Stealing hardware
• Stealing software
• Running code to damage systems
• Running code to damage and corrupt data
• Modifying stored data
Individuals seeking reputation or some sort of acknowledgment typically seek some form of reputation when they challenge to crash Web sites and other public objects on the Internet. There are some network attackers that purely take pleasure in the challenge of trying to compromise highly secured networks’ security systems. These types of attackers simply see their actions as a means of revealing existing security vulnerabilities.
Malicious Attacks,... [continues]
Cite This Essay
(2012, 11). Study of Computer Crime, Cyber Attacks & Terrorism. StudyMode.com. Retrieved 11, 2012, from http://www.studymode.com/essays/Study-Of-Computer-Crime-Cyber-Attacks-1197867.html
"Study of Computer Crime, Cyber Attacks & Terrorism" StudyMode.com. 11 2012. 2012. 11 2012 <http://www.studymode.com/essays/Study-Of-Computer-Crime-Cyber-Attacks-1197867.html>.
- MLA 7
"Study of Computer Crime, Cyber Attacks & Terrorism." StudyMode.com. StudyMode.com, 11 2012. Web. 11 2012. <http://www.studymode.com/essays/Study-Of-Computer-Crime-Cyber-Attacks-1197867.html>.
"Study of Computer Crime, Cyber Attacks & Terrorism." StudyMode.com. 11, 2012. Accessed 11, 2012. http://www.studymode.com/essays/Study-Of-Computer-Crime-Cyber-Attacks-1197867.html.