An attacker may disrupt the information system of an organization (active attack) or gain access to its sensitive information (passive attack). Information systems can be attacked by outsiders who may penetrate a computer system or by insiders who are authorised to use the resources but misuse their authorization. The common motives for computer crimes could be lure for money, revenge, terrorism, fun, recognition or curiosity. The term “Security” brings to mind all shorts of issues that refer to data protection and prevention of unauthorised access. A computer failure will have a critical impact on the organization. Computers are integral part of everyday operations. In the past few years government and military organizations have widely adopted LAN, WAN and Internet to take advantage of advancement in technology.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |