After the break‐in occurs: how to handle the student hacker
Abstract
Outlines the experience of the University of Alabama when a hacker bypassed the preventative security measures of the library management system and accessed the operating system. Discusses how the break‐in occurred, how the hacker was identified and what actions were taken. Concludes that each system will have to decide what direction to take if such a break‐in occurred, suggesting measures such as employing a full‐time investigator for hackers.
Keywords
Citation
Muir, S. (1997), "After the break‐in occurs: how to handle the student hacker", Library Hi Tech, Vol. 15 No. 1/2, pp. 92-95. https://doi.org/10.1108/07378839710307331
Publisher
:MCB UP Ltd
Copyright © 1997, MCB UP Limited