Query Result Set
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
ActiveUsers:1581
Hits:18304495
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
Help
Topics
Tutorial
Advanced search
Hide Options
Sort Order
Natural
Author / Creator, Title
Title
Item Type, Author / Creator, Title
Item Type, Title
Subject, Item Type, Author / Creator, Title
Item Type, Subject, Author / Creator, Title
Publication Date, Title
Items / Page
5
10
15
20
Modern View
CYBER CRIMINALS
(5)
answer(s).
Srl
Item
1
ID:
126187
Arming the information highway patrol
/ Hague, William
Hague, William
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012-13.
Summary/Abstract
Outline cybersecurity measures to combat the internet's dark side
Key Words
Cyberspace
;
Britain
;
Cybersecurity
;
Cyber Criminals
;
Cyber Terrorists
;
National Cybersecurity Programme
In Basket
Export
2
ID:
117148
Contours of security in Cyberspace
/ Poduval, Sanjay
Poduval, Sanjay
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012.
Summary/Abstract
The cyberspace is an intangible medium operating and controlling many aspects of the tangible world. It is a world without barriers therefore artificial barriers have to be erected to prevent free ingress or egress. This is a world still in the nascent stages of its evolution; therefore to stay ahead of the pack we need to be imaginative and innovative. The increasing interconnection of the world's computers, standardization of communications protocols and computing hardware enable a single worm developed attack many systems. This provides attractive avenues for cyber attackers to exploit. Complementing these features, are today's cyber criminals who are increasingly adept at gaining undetected access and maintaining a persistent, low-profile, long-term presence in IT environments. Moreover difficulties in identifying attackers, coupled with an uncertain legal and policy framework, make it difficult to punish the offenders. Therefore, one has to take proactive steps, be vigilant and increase the cost of intrusions to keep unwanted visitors at bay. Today cyber attackers, armed with constantly evolving malicious code are likely to have more paths into a network and extract the secrets it contains making the task of the system administrators a herculean one. The elegance of computer hacking lies in the fact that it may be attempted for a fraction of the cost; all one requires is a laptop connected to the internet and a lot of patience. With this in mind the paper attempts to give an insight into the various contours of cyber security which should be a valuable tool in appreciating the vulnerabilities of the cyberspace.
Key Words
Cyberspace
;
Computer Hacking
;
Cyber Criminals
;
Artificial Barriers
;
Communication Protocols
;
Cyber Attackers
In Basket
Export
3
ID:
109027
Cyber threat and military challenges
/ Ghosh, Abhimanyu
Ghosh, Abhimanyu
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2011.
Key Words
India
;
South Korea
;
Cyberspace
;
ICT
;
Cyber Warfare
;
Vietnam - History
;
Usa
;
Cyber Attacks
;
Non - State Actors
;
Cyber Threat
;
Military Challenges
;
Cyber Criminals
;
Cyber Terrorists
In Basket
Export
4
ID:
166217
Migration season
/ Bijou, Rodrigo
Bijou, Rodrigo
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
Cyber Criminals
;
Dark Migration
In Basket
Export
5
ID:
183312
Tackling Nigerian cyber crime : Nigeria takes steps to crack down on cyber criminals
/ Touray, Murtala
Touray, Murtala
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
Cyber Criminals
;
Nigerian Cyber Crime
In Basket
Export