dc.contributor.author |
Botha, M
|
|
dc.contributor.author |
Von Solms, R
|
|
dc.contributor.editor |
Renaud, K.
|
|
dc.contributor.editor |
Kotze, P
|
|
dc.contributor.editor |
Barnard, A
|
|
dc.date.accessioned |
2018-08-23T08:25:18Z |
|
dc.date.available |
2018-08-23T08:25:18Z |
|
dc.date.issued |
2001 |
|
dc.identifier.citation |
Botha, M. & Von Solms, R. (2001) Computer security: hacking tendencies, criteria and solutions. Hardware, Software and Peopleware: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, University of South Africa, Pretoria, 25-28 September 200 |
en |
dc.identifier.isbn |
1-86888-195-4 |
|
dc.identifier.uri |
http://hdl.handle.net/10500/24746 |
|
dc.description.abstract |
Computer crime and more particularly computer hacking has become increasingly active in today's business environment. Proof of this statement is a survey completed by the Computer Security Institute and the FBI which revealed that corporations, banks and governments all face a growing threat from computer crime (Berst, 1999, p1). Different methods can be used to control access to computer networks such as firewalls, but
none is hacker-proof New ways and means must therefore be defined which will minimise or eliminate computer crime. These ways should involve the utilisation of audit logs and user profiles in a proactive sense. Typical proactive actions that can be defined include: online monitoring, template analysing, generation of reports and generation of alert signals. The objective of this paper is to define and describe a proactive model which will
identify a hacking attempt before it has been performed, on any computer system with more effective and easy to use graphical interfaces. This model should also provide useful tools for the security officer. It will inform the officer of different levels of hacking attempts according to statistical predefined norms. |
en |
dc.language.iso |
en |
en |
dc.subject |
Computer security |
en |
dc.subject |
Computer hacking |
en |
dc.subject |
Statistical solution |
en |
dc.title |
Computer security: hacking tendencies, criteria and solutions |
en |