Skip to Main Content
Article navigation

Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and scale is now available on the computer screen. There is, however, a dark side to all this computer interconnectivity, since it increases the possibility of diliberate unsolicited intrusion into library computers. When such an intrusion occurs, it may come in the form of a computer virus playfully invented by some computer hacker, or it may come as an uninvited e‐mail message from an eager online salesman. There are even some spiteful, vengeful, paranoid attackers who aim to cause destruction. Some intrusions can damage valuable computer‐stored information; others m ay simply divert the attention of a computer user. Protective measures should be taken to avoid some intrusions; others can simply be ignored. In this article, we take a look at some frequently encountered computer intrusions.

This content is only available via PDF.
You do not currently have access to this content.
Don't already have an account? Register

Purchased this content as a guest? Enter your email address to restore access.

Please enter valid email address.
Email address must be 94 characters or fewer.
Pay-Per-View Access
$41.00
Rental

or Create an Account

Close Modal
Close Modal