Reference Hub1
Cybercafé Systems Security

Cybercafé Systems Security

Lawan Ahmed Mohammed
Copyright: © 2008 |Pages: 17
ISBN13: 9781599049038|ISBN10: 1599049031|EISBN13: 9781599049052
DOI: 10.4018/978-1-59904-903-8.ch001
Cite Chapter Cite Chapter

MLA

Mohammed, Lawan Ahmed. "Cybercafé Systems Security." Security and Software for Cybercafes, edited by Esharenana E. Adomi, IGI Global, 2008, pp. 1-17. https://doi.org/10.4018/978-1-59904-903-8.ch001

APA

Mohammed, L. A. (2008). Cybercafé Systems Security. In E. Adomi (Ed.), Security and Software for Cybercafes (pp. 1-17). IGI Global. https://doi.org/10.4018/978-1-59904-903-8.ch001

Chicago

Mohammed, Lawan Ahmed. "Cybercafé Systems Security." In Security and Software for Cybercafes, edited by Esharenana E. Adomi, 1-17. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-903-8.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter introduces the vulnerability and security issues associated with the use and operations of Internet cafés or cybercafés by demonstrating different methods of launching different attacks especially when using commercial Internet cafés in a way that renders the system or other systems inoperable. It discusses the challenges facing those operating and managing Internet cafes, governments, parents, and even educators to ensure proper preventive measures, guidelines, and laws needed to protect the system against breaches, misuses, and abuses. It also argues that defense mechanism against breaches should be dynamic and strong enough due to the increasing number of new freely available cracking tools and harmful Web sites. In addition, virus, worms, Trojan horse, adware, malware, and spyware are spreading beyond imagination. Further, the chapter discusses different defense mechanisms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.