Academic literature on the topic 'Unauthorised access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorised access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Unauthorised access"

1

Bainbridge, David I. "Hacking-The Unauthorised Access of Computer Systems; the Legal Implications." Modern Law Review 52, no. 2 (March 1989): 236–45. http://dx.doi.org/10.1111/j.1468-2230.1989.tb02820.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peady, C. "Unauthorised access to the contents of a Graseby 3300 PCA pump." Anaesthesia 62, no. 1 (January 2007): 98–99. http://dx.doi.org/10.1111/j.1365-2044.2006.04929_1.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osagie, M. S. U., and Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.

Full text
Abstract:
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.
APA, Harvard, Vancouver, ISO, and other styles
4

Kachaeva, G. I., A. D. Popov, and E. A. Rogozin. "FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS." Herald of Dagestan State Technical University. Technical Sciences 45, no. 1 (June 13, 2018): 147–59. http://dx.doi.org/10.21822/2073-6185-2018-45-1-147-159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Savitri. "Should unauthorised arrivals in Australia have free access to advice and assistance?" Australian Journal of Human Rights 6, no. 1 (February 2000): 34–58. http://dx.doi.org/10.1080/1323238x.2000.11911026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Shane, Kevin Curran, and Tom Lunney. "Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses." International Journal of Digital Crime and Forensics 13, no. 6 (November 2021): 1–20. http://dx.doi.org/10.4018/ijdcf.20211101.oa8.

Full text
Abstract:
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments conducted to classify OpenVPN usage found that the Neural Network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
APA, Harvard, Vancouver, ISO, and other styles
7

Maurushat, Alana, and Ron Yu. "When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. Ritz." Computer Law & Security Review 25, no. 2 (January 2009): 185–88. http://dx.doi.org/10.1016/j.clsr.2009.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alferov, V. P., A. V. Butskikh, A. V. Krisilov, A. D. Popov, and E. A. Rogozin. "USE OF A NUMERICAL ANALYTICAL MODEL FOR ASSESSING THE FUNCTIONAL EFFECTIVENESS OF AN INFORMATION PROTECTION SYSTEM BY ANALYSING ITS PROBABILISTIC-TEMPORAL CHARACTERISTICS." Herald of Dagestan State Technical University. Technical Sciences 47, no. 1 (April 21, 2020): 58–71. http://dx.doi.org/10.21822/2073-6185-2020-47-1-58-71.

Full text
Abstract:
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilistic-temporal characteristics of protection functions for automated information systems is a complex and costly task. In order to study the dynamics of transitions between the states of this type of system, it is necessary to develop a mathematical model and an algorithm for computing the corresponding characteristics.Method. To achieve this goal, a mathematical model of the information security system was developed in the MATLAB software environment. The main advantages of this software environment consist in a high level of visualisation, the ability to modify models to analyse other systems of this type and the availability of integration tools with other software products.Results. The article presents a numerical and analytical model of a system for protecting information from unauthorised access. The functional dynamics of the system are described using a stochastic Petri net. In order to solve the integral equations and determine the probabilities of reaching the final state in a given time, the Laplace transform is used. The solution is carried out in an analytical mode to obtain an explicit form of the dependences of the probability-time characteristics of the system on the probabilities of transitions between states and the average times the system stays in each state. The paper presents the results of calculating the probability-time characteristics of the “Turning on the personal computer and user identification” subsystem of the “Guard NT” system for preventing unauthorised access to information.Conclusion. The developed model, which can be used to study the dynamics of transitions between states of an information protection system against unauthorised access in an automated system, as well as to optimise the time it takes to complete functional tasks, can also be used to improve the operational efficiency of these systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Selvadurai, Niloufer, Md Rizwanul Islam, and Peter Gillies. "Unauthorised access to wireless local area networks: The limitations of the present Australian laws." Computer Law & Security Review 25, no. 6 (November 2009): 536–42. http://dx.doi.org/10.1016/j.clsr.2009.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marrow, Helen B., and Tiffany D. Joseph. "Excluded and Frozen Out: Unauthorised Immigrants’ (Non)Access to Care after US Health Care Reform." Journal of Ethnic and Migration Studies 41, no. 14 (July 17, 2015): 2253–73. http://dx.doi.org/10.1080/1369183x.2015.1051465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Unauthorised access"

1

Steh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Uzunay, Yusuf. "Design And Implementation Of An Unauthorized Internet Access Blocking System Validating The Source Information In Internet Access Logs." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607628/index.pdf.

Full text
Abstract:
Internet Access logs in a local area network are the most prominent records when the source of an Internet event is traced back. Especially in a case where an illegal activity having originated from your local area network is of concern, it is highly desirable to provide healthy records to the court including the source user and machine identity of the log record in question. To establish the validity of user and machine identity in the log records is known as source authentication. In our study, after the problem of source authentication in each layer is discussed in detail, we argue that the only way to establish a secure source authentication is to implement a system model that unifies low level and upper level defense mechanisms. Hence, in this thesis we propose an Unauthorized Internet Access Blocking System validating the Source Information in Internet Access Logs. The first version of our proposed system, UNIDES, is a proxy based system incorporating advanced switches and mostly deals with the low level source authentication problems. In the second version, we extend our system with SIACS which is an Internet access control system that deals with the user level source authentication problems. By supplementing the classical username-password authentication mechanism with SSL client authentication, SIACS integrates a robust user level authentication scheme into the proposed solution.
APA, Harvard, Vancouver, ISO, and other styles
4

Henriksson, Michael. "Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279558.

Full text
Abstract:
With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. This risk increases with the value of the data sent and an increase in security should therefore follow this value. Based on this is it therefore important to look at the security aspects of a sensor network to find ways to easy integrate security such as authentication. This to make sure that the only devices and users accessing or sending data on the network is authorized and not malicious devices. This thesis focuses on the authentication and identification of the devices joining the network to make sure that only trusted devices would be able to join. The protocol in focus is ZigBee but the proposed solution can be integrated with any protocol and utilizes a Key Distribution Center (KDC) together with an authentication method based on the Challenge Handshake Authentication Protocol (CHAP) to authenticate new devices before they are allowed into the network. This solution is secure and relatively simple which makes it easy to integrate with any sensor network.
Med en ökad popularitet av att koppla upp sensorer och apparater mot ett nät- verk för att enklare kunna samla in data är säkerhet en aspekt som inte får glömmas bort. När känslig data, så som personlig eller privat data, skickas över nätverket oskyddat kan någon som vill komma åt datan lättare få tag på den. Denna risk ökar med värdet av datan som skickas och en ökningen av säkerhet bör darav följa ökning av värdet på datan. Utav denna anledning är det viktigt att se över säkerheten i sensornätverk och finna lösningar som lätt kan integreras med ett sensornätverk. Detta för att säkerhetsställa att endast de snesornoder som har auktoritet kan gå med i, samt skicka data på nätverket och därmed undvika oönskad åtkomst. Denna avhandling fukuserar på autentisering och identifiering av de noder som ska anslutas till nätverket för att säkerhetsställa att endast pålitliga och auktoriserade noder blir insläppta. Det protokoll som är i fokus i denna avhandling är ZigBee men den föreslagna lösningen kan även integreras med andra protokoll. Den föreslagna lösning- en använder sig även av ett Key Distribution Center (KDC) samt en autentiseringsmetod som baseras på Challenge Handshake Authentication Protocol (CHAP) för att authentisera nya noder innan de blir insläppta i nätverket. Denna lösning är säker och relativt enkel vilket gör det enkelt att integrera med all typer av sensornätverk.
APA, Harvard, Vancouver, ISO, and other styles
5

Ribeiro, Sérgio Luiz de Almeida. "Habeas data e tutela jurisdicional da privacidade: aspectos processuais." Pontifícia Universidade Católica de São Paulo, 2013. https://tede2.pucsp.br/handle/handle/6222.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:22:03Z (GMT). No. of bitstreams: 1 Sergio Luiz de Almeida Ribeiro.pdf: 960554 bytes, checksum: 933a380e14a9abc84a29f86a8f043069 (MD5) Previous issue date: 2013-09-24
This dissertation is about the habeas data and its procedural aspects, as a mean to protect privacy. The main objective of this study is to analyze the usefulness of this feature as a specific instrument for protection of individuals' privacy, as well as to ensure that citizens may control the wrongful use of their personal data through social networks and credit protection institutions. In this sense, the habeas data would not be restricted to obtaining general information or rectifying data before public authorities and private companies. In order to achieve this purpose, and based on the deductive method and bibliographical research, the following topics have been addressed in this paper: historical aspects, concept and objetive of the habeas data, proceedings upon habeas data under Law 9507/1997, and, lastly, controversial aspects on habeas data. As a conclusion, the main criticism developed herein is related to the comparison between the habeas data and the writ of mandamus, which has caused a procedural impact on the Law 9507/97. This Law, that rules the habeas data, changed the primary constitutional objective of it, which was very much related to the protection of privacy and the proceedings to achieve this objective. Another criticism that is addressed herein is related to the rule that imposes to the parties the burden of having an entire administrative process before making use of the habeas data to obtain information or rectify personal data. In theory, this rule refrains the habeas data to become an effective instrument for the avoidance of damages to individuals' privacy caused by credit protection institutions and social networks, for instance
Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a utilidade do referido instituto como instrumento específico de proteção da vida íntima e evidenciar a possibilidade de o indivíduo exercer preventivamente o controle do manuseio indevido de dados pessoais por entidades mantenedoras de bancos dados, como é o caso de redes sociais e órgãos de proteção ao crédito, não se restringindo apenas ao meio processual para obter e/ou retificar informações em entidades mantenedoras de bancos dados, públicas e privadas de caráter público. Para atingir esse propósito, e com o suporte metodológico da abordagem dedutiva e da técnica de pesquisa bibliográfica, os seguintes assuntos foram abordados: aspectos históricos, conceito e escopo do habeas data, o procedimento da ação de habeas data na disciplina da Lei nº 9.507/1997 e, por último, as questões ainda controvertidas acerca do referido instituto. A título de conclusão, a principal crítica que emerge do tema analisado alude à comparação do habeas data ao mandado de segurança, que repercutiu no procedimento adotado por sua norma específica (Lei nº 9.507/1997), afastando assim este remédio constitucional da sua finalidade precípua, qual seja, preservar objetivamente a vida íntima e servir como instrumento processual específico para esse fim. Outra crítica se refere à exigência de o jurisdicionado trilhar e esgotar toda a via administrativa antes de se socorrer do Judiciário, por meio do habeas data, para obtenção de informações e/ou retificação de dados incorretos a seu respeito. Em rigor, tal exigência impede que o habeas data seja instrumento eficaz na prevenção de danos da vida privada perpetrados por órgãos de proteção ao crédito e redes sociais, por exemplo
APA, Harvard, Vancouver, ISO, and other styles
6

Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies Management
In this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience.
APA, Harvard, Vancouver, ISO, and other styles
7

CHAN, CHIH-YU, and 詹智宇. "Encrypted NFC Tags for Preventing Unauthorized Access." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42881402291982139659.

Full text
Abstract:
碩士
國立臺灣科技大學
電機工程系
101
NFC (Near Field Communication) refers to a standards-based connectivity technology, is an extension of existing RFID (Radio Frequency Identification) standards. NFC technology provides wireless connectivity in close proximity, enabling communication and data transfer between electronic devices. Given the inherent security of transmission over short distances and its fairly intuitive operation, NFC technology is extensively used in access control, ticketing, electronic payment and device pairing. With increasing use of NFC applications, security issues have become more serious. In particular, the “Passive Tag” has no CPU to establish a secure channel by performing encryption. Currently, no significant mechanisms for protecting sensitive data stored in tags. This study, a security mechanism is proposed for preventing unauthorized access. Encryption and decryption functions are implemented on an Android smartphone application to store encrypted data in NFC tags. Malicious attackers see only unreadable and unrecognizable “Cipher text” from NFC tags when gain unauthorized access. Therefore, the proposed security mechanism can be used to secure personal data in NFC tags. Measurements made using a currently available Android smart phone reveal that, 700bytes of data can be encrypted/decrypted by AES Encryption in less than 20ms, and that 32bytes of data can be encrypted/decrypted by RSA encryption/decryption in less than 140ms. The data can be compressed using Huffman coding before they are stored in NFC Tags. 700bytes of uncompressed data can be compressed to 400bytes. The time for Tag access is also reduced.
APA, Harvard, Vancouver, ISO, and other styles
8

Ulrich, Neil. "Wetgewing teen elektroniese betreding." Diss., 1998. http://hdl.handle.net/10500/16234.

Full text
Abstract:
Text in Afrikaans
Parralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar
Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised
Criminal & Procedural Law
LL.M. (Criminal & Procedural Law)
APA, Harvard, Vancouver, ISO, and other styles
9

TSAI, CHENG-YU, and 蔡承宇. "Access Control Mechanism for Preventing Images from being Unauthorized Access by Screenshots." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/85fft4.

Full text
Abstract:
碩士
中華大學
資訊管理學系
106
This study is mainly to protect the image when the image was captured by using the screenshot. The user needs to have the authority to access the image. The mechanism proposed in this study avoids intentional people to attempt illegal use of copyright pictures and protect the rights of copyright holders. Therefore, this paper will study how to prevent the image being access by non-copyrights owner. When the user opens the browser, system will check the identity at first. If the identity is the copyright owner, the user will be accesses the copyright image on the webpage by using screenshot successfully. Otherwise, if the non-copyright owner wants to use the screenshot to obtain the copyright image of the other person on the webpage, the copyright image will be turn into a black image according to the proposed mechanism. The proposed mechanism protects images from being accessed by non-copyrights. In order to avoid the illegal use of images ahead, rather than relying on the copyright of the images to claim illegal users compensate by taking legal means after illegal use. Finally, users can access the images with legal permissions through access control, and make the images have more completed protection.
APA, Harvard, Vancouver, ISO, and other styles
10

Chih, Nien-Wen, and 職念文. "Prevent Enterprise Resources from Unauthorized Access Using Microsoft IPSec Solution." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/8pg7fu.

Full text
Abstract:
碩士
世新大學
資訊管理學研究所(含碩專班)
97
The issues of information security can not be solved by using only one single technology of anti-virus, anti-hacking, intrusion detection, and firewall implementation for the past decade. The applications of network developed quickly to make the scope of information security more complex and varied in short years. The information security becomes very important in the industry as well. Therefore, the information security begins to be split into different categories, directions, and levels. The unauthorized inbound connection protection is a part of the information security. The most of LANs in corporation can not provide unauthorized inbound connection protection by using single firewall strategy. The unauthorized inbound connection protection consists of wired connection, wireless connection, remote access connection…etc. The most of technologies and methodologies regarding to unauthorized users in corporation don’t focus on visitors accessing network resources through internal network. The most of current network technologies provide the isolated physical connections or the separated networks using Ethernet switches for the issues of unauthorized access caused by the visitors from outside of corporation. There is a small amount of theses and discourses discuss about the software-based protection mechanism for visitor unauthorized access protection. The IPSec protocol usually applies to layer 2 encryption of VPN, such as L2TP based on Layer 2 Forwarding and establishing secure tunnel and transport mode. This thesis proposes operating system built-in IPSec to be the base of networking operation. Using IPSec software-based technology achieves the discussion of feasibility study for visitor unauthorized access protection. In order to set the scope of access, IPSec transport mode will be used to discuss on operation in corporation.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Unauthorised access"

1

Unauthorised access: Physical penetration testing for IT security teams. Chichester, West Sussex, U.K: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Commission, South African Law. Computer-related crime: Preliminary proposal for reform in respect of unauthorised access to computers, unauthorised modification of computer data and software applications and related procedural aspects. [Pretoria: The Commission, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Woodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rights, United States Congress House Committee on the Judiciary Subcommittee on Civil and Constitutional. Unauthorized access to individual medical records: Hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, second session, on H.R. 5831 ... August 9, 1984. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. Senate. A bill to provide individuals with access to health information of which they are a subject, ensure personal privacy with respect to health-care-related information, impose criminal and civil penalties for unauthorized use of protected health information, to provide for the strong enforcement of these rights, and to protect States' rights. Washington, D.C: U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Allsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Commission, South African Law, ed. Computer related crime: Options for reform in respect of unauthorised access to computers, unauthorised modification of computer data, and software applications and related procedural aspects. [Pretoria]: The Commission, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Unauthorized Access. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Unauthorised access"

1

Maurushat, Alana. "Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions." In SpringerBriefs in Cybersecurity, 35–52. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chawki, Mohamed, Ashraf Darwish, Mohammad Ayoub Khan, and Sapna Tyagi. "Unauthorized Access Offences in Cyberworld." In Studies in Computational Intelligence, 27–37. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15150-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xia, Haidong, and José Brustoloni. "Detecting and Blocking Unauthorized Access in Wi-Fi Networks." In Lecture Notes in Computer Science, 795–806. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24693-0_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Hyuncheol, Sunghae Kim, Seongjin Ahn, and Jinwook Chung. "A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability." In Lecture Notes in Computer Science, 635–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30141-7_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rayani, Praveen Kumar, and Suvamoy Changder. "Continuous Gait Authentication Against Unauthorized Smartphone Access Through Naïve Bayes Classifier." In Intelligent Computing and Communication, 799–808. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1084-7_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shumilina, Vera, and Elena Tetunashvili. "INFORMATION SECURITY AS A COMPONENT OF THE ECONOMIC SECURITY OF THE ENTERPRISE." In Business security management in modern conditions, 119–29. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635b4a2f5.44169199.

Full text
Abstract:
The article is devoted to the study of information security as an integral part of the economic security of any modern enterprise. Threats are described that can lead to disclosure of confidential information, leakage of confidential information, unauthorized access to protected information, etc. Means and ways of countering the presented threats are also given
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Duhoe, Doyeon Kim, Dongil Shin, Dongkyoo Shin, and Yong-Hyun Kim. "Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning." In Lecture Notes in Electrical Engineering, 510–19. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3648-5_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kocabas, Huzeyfe, Swapnil Nandy, Tanjina Tamanna, and Mahdi Nasrullah Al-Ameen. "Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account." In HCI for Cybersecurity, Privacy and Trust, 310–25. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Curran, Kevin, Peter Breslin, Kevin McLaughlin, and Gary Tracey. "Hackers, Hacking, and Eavesdropping." In Encyclopedia of Internet Technologies and Applications, 199–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch029.

Full text
Abstract:
"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.
APA, Harvard, Vancouver, ISO, and other styles
10

Sloan, Robert H., and Richard Warner. "Introduction." In Unauthorized Access, 1–12. CRC Press, 2016. http://dx.doi.org/10.1201/b15148-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Unauthorised access"

1

Sansurooah, Krishnun, Patryk Szewczyk, and Dan Blackman. "Unauthorised Wireless Network Access Attempts in Western Australia." In 2016 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2016. http://dx.doi.org/10.1109/csci.2016.0191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Almehmadi, Abdulaziz, and Khalil El-Khatib. "Authorized! access denied, unauthorized! access granted." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kitova, E. T., N. I. Gorlov, and I. V. Bogachkov. "Unauthorized Access Monitoring in Optical Access Networks." In 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2020. http://dx.doi.org/10.1109/synchroinfo49631.2020.9166039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ding, Han, Jinsong Han, Yanyong Zhang, Fu Xiao, Wei Xi, Ge Wang, and Zhiping Jiang. "Preventing Unauthorized Access on Passive Tags." In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, 2018. http://dx.doi.org/10.1109/infocom.2018.8486424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tascini, Guido, Antonella Carbonaro, and Primo Zingaretti. "Unauthorized access identification in restricted areas." In Aerospace/Defense Sensing and Controls, edited by Jacques G. Verly. SPIE, 1998. http://dx.doi.org/10.1117/12.317481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Yutong, Linghe Kong, Yifeng Cao, Vahan Sarafian, Long Cheng, and Guihai Chen. "Stop Unauthorized Access to Your Smart Devices." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarumi, Jerry A. "A Review of Encryption Methods for Secure Data Communication." In Advances in Multidisciplinary and Scientific Research Journal Publication. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2022. http://dx.doi.org/10.22624/aims/isteams/lasustech2022v30p7.

Full text
Abstract:
We are living in the new era of information, and information is an important aspect of our living. So, the need of security is to ensure that our information remains confidential and only authorized users can access it, and ensuring that no unauthorized user has changed our information, so that it provides full accuracy and efficiency. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change and also available to an authorized entity when it is needed. Cryptography is a technique that can be employed to ensure the security of transmitted information. This papers reviews existing tecgniques for cryptography and identified salient attributes of each method. Keywords: Cryptography; Symmetric key; ciphered text; Public Key; Private Key; Encryption; Decryption, Security, Transmission, Cyber Security.
APA, Harvard, Vancouver, ISO, and other styles
8

Gharooni, Maryam, Mazdak Zamani, Mehdi Mansourizadeh, and Shahidan Abdullah. "A confidential RFID model to prevent unauthorized access." In 2011 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2011. http://dx.doi.org/10.1109/icaict.2011.6110985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sokolov, Sergey S., Oleg M. Alimov, Lyudmila E. Ivleva, Ekaterina Yu Vartanova, and Vyacheslav G. Burlov. "Using unauthorized access to information based on applets." In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2018. http://dx.doi.org/10.1109/eiconrus.2018.8317046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhukova, Marina N., Vyacheslav V. Zolotarev, Vadim G. Zhukov, and Anastasya S. Polyakova. "Service Robot Security from Unauthorized Access by Connection Control." In 2019 12th International Conference on Developments in eSystems Engineering (DeSE). IEEE, 2019. http://dx.doi.org/10.1109/dese.2019.00102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography