Abstract Views :188 |
PDF Views:102
Authors
Affiliations
1 Computer Science & Engineering, IN
Source
Reason-A Technical Journal (Formerly Reason-A Technical Magazine), Vol 4 (2003), Pagination: 33-35
Abstract
Almost everyday we hear that the system run by the government and private organizations have been penetrated or hacked. Even U.S. Military system and Microsoft organization have been hacked or defaced. As we become increasingly reliant upon information technology and communication technology, the exploitation by cyber-criminals poses an ever-greater threat to the public infrastructure.
Full Text