IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 7    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 7, July 2011 Edition
How can distinguish between Hackers and Intruders
Full Text(PDF, 3000)  PP.  
Asmaa Shaker Ashoor , Prof. Sharad Gore
Hackers, intruders, security, criminal, network scanning, motives
This paper presents the difference between hackers and intruders with their main motives and intentions with their way of thinking, planning and performing attacks for their personal gain and as well as others gain. This shows the security of computer networks and information systems can't protect effectively if the human factor fails. Here explaining how the network is hacked or intruded by using several numbers of tools with achieving their motives.
[1] William Stallings ,”Network security essentials: applications and standards”, 2010

[2] Carl Endorf, Eugene Schultz and Jim Mellander ""Intrusion Detection and Prevention"";; 2004.

[3] Thomas W. Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, “Dr. Tom Shinder's ISA Server 2006 Migration Guide” .

[4] Dragan Pleskonjic ”Psychologi-cal Profile of Network Intruder “.

[5] Digital Crime: Hackers, Part 1 -Release date: 12/03

[6] Peter Stephenson ,”Computer-Related Crime A handbook for corporate”. By CRC Prss LLC,2000.

[7] Handbook of Managing Cisco Network Security

[8] Carnegie Mallon, “CERT 2009 Research Report”, software Engineering Institute.

Untitled Page