Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Direct Cyberattack

Encyclopedia of Information Science and Technology, Fourth Edition
Direct cyberattack causes data communications interception at the hands of a specific hacker who may have located a specific person or Wi-Fi area in order to perform such cybercrime. A type of direct attach is direct access, where the criminal gains physical access to either the computer or its network in order to compromise security by loading worms, Trojans, compromising data, etc.
Published in Chapter:
BYOD (Bring Your Own Device), Mobile Technology Providers, and Its Impacts on Business/Education and Workplace/Learning Applications
Amber A. Smith-Ditizio (Texas Woman's University, USA) and Alan D. Smith (Robert Morris University, USA)
Copyright: © 2018 |Pages: 11
DOI: 10.4018/978-1-5225-2255-3.ch520
Abstract
Outside the traditional business institutions and learning models, a number of organizations and academic institutions are looking to add bring your own device (BYOD) policies. Businesses and K-12 schools are supplying teachers with devices that can be an aid in working/learning; universities are increasingly allowing students to bring their own devices to add to the enrichment of the programs. BYOD–based technology and it applications have numerous benefits, but they can be difficult to implement. They usually result in lower costs for the business, but they often require the organization to adapt. Since there are so many constraints and situations that could inhibit the security of the business, some businesses are hesitant to use BYOD in their business.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Computer Fraud Challenges and Its Legal Implications
Direct cyberattack causes data communications interception at the hands of a specific hacker who may have located a specific person or Wi-Fi area in order to perform such cybercrime. A type of direct attach is direct access, where the criminal gains physical access to either the computer or its network in order to compromise security by loading worms, Trojans, compromising data, etc.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR