ICT Security Policy: Challenges and Potential Remedies

ICT Security Policy: Challenges and Potential Remedies

Lawan A. Mohammed
Copyright: © 2012 |Pages: 17
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch501
Cite Chapter Cite Chapter

MLA

Mohammed, Lawan A. "ICT Security Policy: Challenges and Potential Remedies." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 999-1015. https://doi.org/10.4018/978-1-61350-323-2.ch501

APA

Mohammed, L. A. (2012). ICT Security Policy: Challenges and Potential Remedies. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 999-1015). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch501

Chicago

Mohammed, Lawan A. "ICT Security Policy: Challenges and Potential Remedies." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 999-1015. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch501

Export Reference

Mendeley
Favorite

Abstract

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of computer crime has accelerated beyond imagination. It is therefore vital to find policy of reducing and controlling the risk associated with such activities. However, unless the security challenges and countermeasures are well understood, the policy may not yield any fruitful results. This chapter discusses different categories of computer crime for the benefit of individuals and organizations concern with combating the problem. The chapter also discuses some security policies as means of limiting some of the vulnerabilities mentioned.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.