A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. The computer hacking activities caused well over $100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, to control the access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are inefficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. This paper will propose a method, based on trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.
Article navigation
1 December 2001
This article was originally published in
Information Management & Computer Security
Literature Review|
December 01 2001
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept Available to Purchase
Martin Botha;
Martin Botha
Department of Information Technology, Port Elizabeth Technikon, Port Elizabeth, South Africa
Search for other works by this author on:
Rossouw von Solms
Rossouw von Solms
Department of Information Technology, Port Elizabeth Technikon, Port Elizabeth, South Africa
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
2001
Information Management & Computer Security (2001) 9 (5): 237–242.
Citation
Botha M, von Solms R (2001), "The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept". Information Management & Computer Security, Vol. 9 No. 5 pp. 237–242, doi: https://doi.org/10.1108/EUM0000000006069
Download citation file:
273
Views
Suggested Reading
So long, and thanks for only using readily available scripts
Information and Computer Security (March,2017)
Networks security measures using neuro‐fuzzy agents
Information Management & Computer Security (March,2003)
Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share
The Bottom Line (March,2002)
Hackers: Crime in the Digital Sublime
Policing: An International Journal (September,2001)
Dissecting the “Hacker Manifesto”
Information Management & Computer Security (May,1999)
Related Chapters
The Crypto Investing Landscape
The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
An Exhortation To Liberate The [AGORA]
The Director and the Manager: Law and Governance in the Digital Age Machiavelli Had It Easy
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
