Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Port Scans

Handbook of Research on Threat Detection and Countermeasures in Network Security
Scan across responding hosts to find running services.
Published in Chapter:
Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
Zuhoor Abdullah Salim Al-Khanjari (Sultan Qaboos University, Oman) and Asaad Abdulrahman Nayyef (Sultan Qaboos University, Iraq)
DOI: 10.4018/978-1-4666-6583-5.ch004
Abstract
The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR