Reference Hub3
Information Systems Security: Cases of Network Administrator Threats

Information Systems Security: Cases of Network Administrator Threats

Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma, Haralambos Mouratidis
Copyright: © 2007 |Volume: 1 |Issue: 3 |Pages: 13
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203291|EISSN: 1930-1669|DOI: 10.4018/jisp.2007070102
Cite Article Cite Article

MLA

Jahankhani, Hamid, et al. "Information Systems Security: Cases of Network Administrator Threats." IJISP vol.1, no.3 2007: pp.13-25. http://doi.org/10.4018/jisp.2007070102

APA

Jahankhani, H., Fernando, S., Nkhoma, M. Z., & Mouratidis, H. (2007). Information Systems Security: Cases of Network Administrator Threats. International Journal of Information Security and Privacy (IJISP), 1(3), 13-25. http://doi.org/10.4018/jisp.2007070102

Chicago

Jahankhani, Hamid, et al. "Information Systems Security: Cases of Network Administrator Threats," International Journal of Information Security and Privacy (IJISP) 1, no.3: 13-25. http://doi.org/10.4018/jisp.2007070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee” that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network security is implemented. However, this implementation depends on the network designers at the initial stage and the network administrators in the long term. Administrator may pave the way to attacks that could take place either at once where an obvious vulnerability may exist or in several phases where it requires information gathering or scanning in order to enter into the target system. Two studies on real cases given in this paper highlights the influence of such network administrators. To preserve the confidentiality, the names of personnel or organizations are not revealed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.