Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hackers

Handbook of Research on Threat Detection and Countermeasures in Network Security
Used a variety of tools and techniques to attack the websites or networks.
Published in Chapter:
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
Zuhoor Abdullah Salim Al-Khanjari (Sultan Qaboos University, Oman) and Asaad Abdulrahman Nayyef (Sultan Qaboos University, Iraq)
DOI: 10.4018/978-1-4666-6583-5.ch004
Abstract
The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Defending Information Networks in Cyberspace: Some Notes on Security Needs
a) This term originally referred to a computer enthusiast, or computerphile, who enjoys computer technology and programming to the point of examining the code of operating systems to figure out how they work. A hacker can “hack” his or her way through the security levels of a computer system or network. This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software; b) Synonymous with cracker . A person who gains or attempts to gain unauthorized access to computers or computer networks and tamper with operating systems, application programs, and databases. Crackers are the reason software manufacturers release periodic “security updates” to their programs.
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
A computer hacker is a computer expert who uses their technical knowledge in systems and technologies to achieve a goal such as making unauthorised entry or overcome an obstacle by breaking into a software, within a computerized system by non-standard and unethical ways.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR