The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Hackers, Hacking, and Eavesdropping
|
Author(s): Kevin Curran (University of Ulster, Ireland), Peter Breslin (University of Ulster, Ireland), Kevin McLaughlin (University of Ulster, Ireland)and Gary Tracey (University of Ulster, Ireland)
Copyright: 2008
Pages: 6
Source title:
Encyclopedia of Internet Technologies and Applications
Source Author(s)/Editor(s): Mario Freire (University of Beira Interior, Portugal)and Manuela Pereira (University of Beira Interior, Portugal)
DOI: 10.4018/978-1-59140-993-9.ch029
Purchase
|
Abstract
"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.
Related Content
Nalini M..
© 2023.
22 pages.
|
Balachandar S., Chinnaiyan R..
© 2023.
19 pages.
|
V. A. Velvizhi, G. Senbagavalli, S. Malini.
© 2023.
29 pages.
|
Amuthan Nallathambi, Kannan Nova.
© 2023.
25 pages.
|
Amuthan Nallathambi, Sivakumar N., Velrajkumar P..
© 2023.
17 pages.
|
Nayana Hegde, Sunilkumar S. Manvi.
© 2023.
18 pages.
|
Udayakumar K., Ramamoorthy S., Poorvadevi R..
© 2023.
26 pages.
|
|
|