Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Intrusion

Encyclopedia of Criminal Activities and the Deep Web
Wrongfully accessing a computer’s system or network.
Published in Chapter:
Cybersecurity Laws in Malaysia
Olivia Swee Leng Tan (Multimedia University, Malaysia), Rossanne Gale Vergara (Multimedia University, Malaysia), Raphael C. W. Phan (Multimedia University, Malaysia), Shereen Khan (Multimedia University, Malaysia), and Nasreen Khan (Multimedia University, Malaysia)
Copyright: © 2020 |Pages: 14
DOI: 10.4018/978-1-5225-9715-5.ch030
Abstract
The progression of information and communication technologies (ICT) use have been matched by the rise in corruption and abuse of technology for criminal activities. In 2018, The Malaysia Computer Emergency Response Team reported 10,699 incidents, of which “fraud” had the highest reported incidents (5,123) and the second highest “intrusion attempt” (1,805) of the total incidents. Malaysia cyber laws have existed since 1997 and are still used today to prosecute cybercrimes. Most recent cases were charged under Malaysian laws—Computer Crimes Act 1997, Copyright (Amendment) Act 1997, Communications and Multimedia Act 1998, Personal Data Protection Act 2010, and Malaysian Penal Code—to combat cybercrimes. This chapter discusses Malaysia's cyber laws, cases charged under these laws, and their relevance to combating cybercrimes in Malaysia.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Routing Security in Wireless Sensor Networks
Can be defined as a set of actions that can lead to an unauthorized access or alteration of a certain system.
Full Text Chapter Download: US $37.50 Add to Cart
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
The set of actions that attempts to compromise integrity, confidentiality or availability of network resources.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
An attacker gaining access to some computer system, to steal or damage data, or to control and use its resources.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions
An event where unauthorized users, generally referred to as hackers, gather information or access rights that he/she is normally not allowed to.
Full Text Chapter Download: US $37.50 Add to Cart
ICT Security Policy: Challenges and Potential Remedies
The act of accessing a computer system or network without authorization.
Full Text Chapter Download: US $37.50 Add to Cart
The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks
Full Text Chapter Download: US $37.50 Add to Cart
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
The term intrusion is in this context simply defined as an attack on a computer system, resulting in a breach.
Full Text Chapter Download: US $37.50 Add to Cart
Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
An event that an unauthorized user gathers a piece of information or an access right that he/she is not allowed to. Mostly represented by the events in IDSs.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Quantum-Resistant Blockchain
Is the occurrence of an unauthorized user obtaining data or access permission that they are prohibited from.
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study of Decision Support System and Warehouse Management System Integration
An event in which an unauthorized user gathers a piece of information or an access right that he/she is not allowed to.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Based Intrusion Detection in Wireless Networks
Any set of actions that attempt to compromise the integrity, confidentiality, or the availability of a resource.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR