1. Unauthorized Access
Basically, it can refer to a various sort of attacks. The main purpose of these attacks is
to access the recourse that your computer should not allow to be visited. For example, a web server, the web master / administrator
should not simply give the power of authorization to the unknown person the control the web server. Once the person steal
the data or modify the data inside the web server, it may cause some unexpected consequence.
Executing Commands Illicitly
It does refer to an unknown or un-trusted person to execute some illegal commands thought
the server machines. Two main classification of the severity of this problem are normal user access and administrator access.
The normal user only able to do some limited thing on a system such as read files or enquiry the information only. But the
attackers wish that they can make the configuration through insides the server machines as similar as an administrator like
changing IP address or putting some unknown script inside the website to cause the machine shut down automatically.
3. Confidentiality Breaches
Initially we must examine what kind of treat model that we face: what is it
that you're trying to protect yourself against? These is quite damaging if some vital information fell into the hand of a
competitor, an enemy or the public. For example, if your business confidential information is stolen by another company, then
your company will lose the oppoturnity to survive in the market since the competitor knows all the operation and action about
yours. Besides that, the new innovation product will be copied by the competitor at the same time, then your company will
lose all the profit margin and aslo the competition in the market.
4. Destructive Behavior
Among the destructive sorts of break-ins and attacks, there are two major
l Data Diddling.
The attackers try to hack in the database server and modify the data / information
inside the machine. The wrong information will be generated to the user and provide a wrong message to the high level management
to do wrong decision. For example, the profit amount of daily / monthly sales report is reduced with Zero from 100, 000, 00
to 10, 000, 00 can cause a lot of consequence inside the company.
l Data Destruction.
The attacker will destroy some vital information or system file inside the machine
to cause the machine can not function very well. Or the wrong message will be provided when using the system server. For example,
the attackers delete the hardware driver to make the certain hardware lose the function like storage, which use to store the
transaction every day.
Legitimacy in Computer Network
The Computer Law & Security Report is a journal published 6 issues a year.
In-depth articles, case reports with analysis and a briefing column that highlights international trends and the latest news
is delivered by the journal from around the world. Intellectual Property, Information Technology and Telecommunications law
are monitored by a regular European Union features. The Computer Law and Security Report regularly cover:
- Data protection and privacy
- Data and software protection
- European community developments in IT, IP and telecoms law
- IT contracts
- Telecommunications law and online liability
- Internet law and security policy
- Electronic commerce
- Internet fraud and misuse
- Systems security and risk management
More than 80 specialists are included by
the forum in computer law and security - between them specializing in every aspect of computer and communications law - spotting
trends, highlighting practical concerns, monitoring new problems, and outlining key developments.
Each issue contains well-researched reliable
and thought provoking articles, case studies, detailed features and news reports - ensuring that you do not miss out on the
impact of legislation worldwide and that you understand the problems of managing the legal and security requirements of computer
- Contact details of authors and features
- Web site references for further information including document access guidance on where to obtain further information
- Detailed appendices after articles
- Header summaries on each feature for easy scanning
- Product and people news
- Regular IT case law analysis and recent legislation
- Clear and easy to read
- Worldwide panel of expert correspondents
- Thorough index of each volume