To read this content please select one of the options below:

After the break‐in occurs: how to handle the student hacker

Scott Muir (Scott Muir is Head of Systems, University Libraries, Boston College, Chestnut Hill, Massachusetts)

Library Hi Tech

ISSN: 0737-8831

Article publication date: 1 April 1997

333

Abstract

Outlines the experience of the University of Alabama when a hacker bypassed the preventative security measures of the library management system and accessed the operating system. Discusses how the break‐in occurred, how the hacker was identified and what actions were taken. Concludes that each system will have to decide what direction to take if such a break‐in occurred, suggesting measures such as employing a full‐time investigator for hackers.

Keywords

Citation

Muir, S. (1997), "After the break‐in occurs: how to handle the student hacker", Library Hi Tech, Vol. 15 No. 1/2, pp. 92-95. https://doi.org/10.1108/07378839710307331

Publisher

:

MCB UP Ltd

Copyright © 1997, MCB UP Limited

Related articles