Hackers, Hacking, and Eavesdropping

Hackers, Hacking, and Eavesdropping

Kevin Curran, Peter Breslin, Kevin McLaughlin, Gary Tracey
Copyright: © 2008 |Pages: 6
ISBN13: 9781591409939|ISBN10: 1591409934|EISBN13: 9781591409946
DOI: 10.4018/978-1-59140-993-9.ch029
Cite Chapter Cite Chapter

MLA

Curran, Kevin, et al. "Hackers, Hacking, and Eavesdropping." Encyclopedia of Internet Technologies and Applications, edited by Mario Freire and Manuela Pereira, IGI Global, 2008, pp. 199-204. https://doi.org/10.4018/978-1-59140-993-9.ch029

APA

Curran, K., Breslin, P., McLaughlin, K., & Tracey, G. (2008). Hackers, Hacking, and Eavesdropping. In M. Freire & M. Pereira (Eds.), Encyclopedia of Internet Technologies and Applications (pp. 199-204). IGI Global. https://doi.org/10.4018/978-1-59140-993-9.ch029

Chicago

Curran, Kevin, et al. "Hackers, Hacking, and Eavesdropping." In Encyclopedia of Internet Technologies and Applications, edited by Mario Freire and Manuela Pereira, 199-204. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59140-993-9.ch029

Export Reference

Mendeley
Favorite

Abstract

"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.