Institutional Repository

Computer security: hacking tendencies, criteria and solutions

Show simple item record

dc.contributor.author Botha, M
dc.contributor.author Von Solms, R
dc.contributor.editor Renaud, K.
dc.contributor.editor Kotze, P
dc.contributor.editor Barnard, A
dc.date.accessioned 2018-08-23T08:25:18Z
dc.date.available 2018-08-23T08:25:18Z
dc.date.issued 2001
dc.identifier.citation Botha, M. & Von Solms, R. (2001) Computer security: hacking tendencies, criteria and solutions. Hardware, Software and Peopleware: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, University of South Africa, Pretoria, 25-28 September 200 en
dc.identifier.isbn 1-86888-195-4
dc.identifier.uri http://hdl.handle.net/10500/24746
dc.description.abstract Computer crime and more particularly computer hacking has become increasingly active in today's business environment. Proof of this statement is a survey completed by the Computer Security Institute and the FBI which revealed that corporations, banks and governments all face a growing threat from computer crime (Berst, 1999, p1). Different methods can be used to control access to computer networks such as firewalls, but none is hacker-proof New ways and means must therefore be defined which will minimise or eliminate computer crime. These ways should involve the utilisation of audit logs and user profiles in a proactive sense. Typical proactive actions that can be defined include: online monitoring, template analysing, generation of reports and generation of alert signals. The objective of this paper is to define and describe a proactive model which will identify a hacking attempt before it has been performed, on any computer system with more effective and easy to use graphical interfaces. This model should also provide useful tools for the security officer. It will inform the officer of different levels of hacking attempts according to statistical predefined norms. en
dc.language.iso en en
dc.subject Computer security en
dc.subject Computer hacking en
dc.subject Statistical solution en
dc.title Computer security: hacking tendencies, criteria and solutions en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics