To read this content please select one of the options below:

Computer intrusions and attacks

The Electronic Library

ISSN: 0264-0473

Article publication date: 1 April 1999

1333

Abstract

Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and scale is now available on the computer screen. There is, however, a dark side to all this computer interconnectivity, since it increases the possibility of diliberate unsolicited intrusion into library computers. When such an intrusion occurs, it may come in the form of a computer virus playfully invented by some computer hacker, or it may come as an uninvited e‐mail message from an eager online salesman. There are even some spiteful, vengeful, paranoid attackers who aim to cause destruction. Some intrusions can damage valuable computer‐stored information; others m ay simply divert the attention of a computer user. Protective measures should be taken to avoid some intrusions; others can simply be ignored. In this article, we take a look at some frequently encountered computer intrusions.

Keywords

Citation

Falk, H. (1999), "Computer intrusions and attacks", The Electronic Library, Vol. 17 No. 2, pp. 115-119. https://doi.org/10.1108/02640479910329635

Publisher

:

MCB UP Ltd

Copyright © 1999, MCB UP Limited

Related articles