The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Attackers: Internal and External
Abstract
Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or unaware employee that clicks on a link that infects a computer or a network, to the security expert working for a criminal, military, or terrorist organization attacking a critical information infrastructure. This chapter examines the various classes of potential attackers and the techniques currently used to perpetrate such attacks.
Related Content
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri.
© 2024.
58 pages.
|
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper.
© 2024.
31 pages.
|
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha.
© 2024.
33 pages.
|
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi.
© 2024.
25 pages.
|
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya.
© 2024.
24 pages.
|
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf.
© 2024.
24 pages.
|
Rida Zehra.
© 2024.
18 pages.
|
|
|