Computer intrusions and attacks
Abstract
Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and scale is now available on the computer screen. There is, however, a dark side to all this computer interconnectivity, since it increases the possibility of diliberate unsolicited intrusion into library computers. When such an intrusion occurs, it may come in the form of a computer virus playfully invented by some computer hacker, or it may come as an uninvited e‐mail message from an eager online salesman. There are even some spiteful, vengeful, paranoid attackers who aim to cause destruction. Some intrusions can damage valuable computer‐stored information; others m ay simply divert the attention of a computer user. Protective measures should be taken to avoid some intrusions; others can simply be ignored. In this article, we take a look at some frequently encountered computer intrusions.
Keywords
Citation
Falk, H. (1999), "Computer intrusions and attacks", The Electronic Library, Vol. 17 No. 2, pp. 115-119. https://doi.org/10.1108/02640479910329635
Publisher
:MCB UP Ltd
Copyright © 1999, MCB UP Limited