Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and scale is now available on the computer screen. There is, however, a dark side to all this computer interconnectivity, since it increases the possibility of diliberate unsolicited intrusion into library computers. When such an intrusion occurs, it may come in the form of a computer virus playfully invented by some computer hacker, or it may come as an uninvited e‐mail message from an eager online salesman. There are even some spiteful, vengeful, paranoid attackers who aim to cause destruction. Some intrusions can damage valuable computer‐stored information; others m ay simply divert the attention of a computer user. Protective measures should be taken to avoid some intrusions; others can simply be ignored. In this article, we take a look at some frequently encountered computer intrusions.
Article navigation
1 April 1999
Review Article|
April 01 1999
Computer intrusions and attacks Available to Purchase
Publisher: Emerald Publishing
Online ISSN: 1758-616X
Print ISSN: 0264-0473
© MCB UP Limited
1999
The Electronic Library (1999) 17 (2): 115–119.
Citation
Falk H (1999), "Computer intrusions and attacks". The Electronic Library, Vol. 17 No. 2 pp. 115–119, doi: https://doi.org/10.1108/02640479910329635
Download citation file:
Suggested Reading
So long, and thanks for only using readily available scripts
Information and Computer Security (March,2017)
Legal control of computer crime in Hong Kong
Information Management & Computer Security (May,1995)
Inadequate security encourages the thief
Industrial Management & Data Systems (March,1995)
Computer abuse: vandalizing the information society
Internet Research (March,1997)
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
Information Management & Computer Security (December,2001)
Related Chapters
The Crypto Investing Landscape
The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
An Exhortation To Liberate The [AGORA]
The Director and the Manager: Law and Governance in the Digital Age Machiavelli Had It Easy
Universally Accessible Makerspace Recommendation to the District of Columbia Public Library
Accessibility for Persons with Disabilities and the Inclusive Future of Libraries
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
