it can refer to a various sort of attacks. The main purpose of these attacks is to access the recourse that your computer
should not allow to be visited. For example, a web server, the web master / administrator should not simply give the power
of authorization to the unknown person the control the web server. Once the person steal the data or modify the data inside
the web server, it may cause some unexpected consequence.
It does refer to an
unknown or un-trusted person to execute some illegal commands thought the server machines. Two main classification of the
severity of this problem are normal user access and administrator access. The normal user only able to do some limited thing
on a system such as read files or enquiry the information only. But the attackers wish that they can make the configuration
through insides the server machines as similar as an administrator like changing IP address or putting some unknown script
inside the website to cause the machine shut down automatically.
we must examine what kind of treat model that we face: what is it that you're trying to protect yourself against? These is
quite damaging if some vital information fell into the hand of a competitor, an enemy or the public. For example, if your
business confidential information is stolen by another company, then your company will lose the oppoturnity to survive in
the market since the competitor knows all the operation and action about yours. Besides that, the new innovation product will
be copied by the competitor at the same time, then your company will lose all the profit margin and aslo the competition in
the destructive sorts of break-ins and attacks, there are two major categories.
attackers try to hack in the database server and modify the data / information inside the machine. The wrong information will
be generated to the user and provide a wrong message to the high level management to do wrong decision. For example, the profit
amount of daily / monthly sales report is reduced with Zero from 100, 000, 00 to 10, 000, 00 can cause a lot of consequence
inside the company.
attacker will destroy some vital information or system file inside the machine to cause the machine can not function very
well. Or the wrong message will be provided when using the system server. For example, the attackers delete the hardware driver
to make the certain hardware lose the function like storage, which use to store the transaction every day.
Legitimacy in Computer Network
The Computer Law & Security Report is a journal published 6 issues a year. In-depth articles, case reports with analysis and
a briefing column that highlights international trends and the latest news is delivered by the journal from around the world.
Intellectual Property, Information Technology and Telecommunications law are monitored by a regular European Union features.
The Computer Law and Security Report regularly cover:
- Data protection and privacy
- Data and software protection
- European community developments in IT, IP and
- IT contracts
- Telecommunications law and online liability
- Internet law and security policy
- Electronic commerce
- Internet fraud and misuse
- Systems security and risk management
More than 80 specialists are included by the forum in computer law and security - between them
specializing in every aspect of computer and communications law - spotting trends, highlighting practical concerns, monitoring
new problems, and outlining key developments.
Each issue contains well-researched reliable and thought provoking articles, case studies, detailed
features and news reports - ensuring that you do not miss out on the impact of legislation worldwide and that you understand
the problems of managing the legal and security requirements of computer use.
- Contact details of authors and features
- Web site references for further information including
document access guidance on where to obtain further information
- Detailed appendices after articles
- Header summaries on each feature for easy scanning
- Product and people news
- Regular IT case law analysis and recent legislation
- Clear and easy to read
- Worldwide panel of expert correspondents
- Thorough index of each volume