ICT Security Policy: Challenges and Potential Remedies

ICT Security Policy: Challenges and Potential Remedies

Lawan A. Mohammed
ISBN13: 9781615208470|ISBN10: 161520847X|EISBN13: 9781615208487
DOI: 10.4018/978-1-61520-847-0.ch020
Cite Chapter Cite Chapter

MLA

Mohammed, Lawan A. "ICT Security Policy: Challenges and Potential Remedies." Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements, edited by Esharenana E. Adomi, IGI Global, 2011, pp. 337-353. https://doi.org/10.4018/978-1-61520-847-0.ch020

APA

Mohammed, L. A. (2011). ICT Security Policy: Challenges and Potential Remedies. In E. Adomi (Ed.), Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements (pp. 337-353). IGI Global. https://doi.org/10.4018/978-1-61520-847-0.ch020

Chicago

Mohammed, Lawan A. "ICT Security Policy: Challenges and Potential Remedies." In Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements, edited by Esharenana E. Adomi, 337-353. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-847-0.ch020

Export Reference

Mendeley
Favorite

Abstract

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of computer crime has accelerated beyond imagination. It is therefore vital to find policy of reducing and controlling the risk associated with such activities. However, unless the security challenges and countermeasures are well understood, the policy may not yield any fruitful results. This chapter discusses different categories of computer crime for the benefit of individuals and organizations concern with combating the problem. The chapter also discuses some security policies as means of limiting some of the vulnerabilities mentioned.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.