Abstract
In recent years the problem of computer security has increasingly awakened public agencies and various organizations, and sensitive data of all kinds traverse it: personal letters, credit card numbers, private data etc. The Internet has developed from a university playground to a communication network for private persons, companies, government agencies, and various organizations, and sensitive data of all kinds traverse it: personal letters, credit card numbers and bank account PINs, medical histories and examination results, management data, military secrets, and development plans of high-tech firms. Since ever more computers are networked, increasingly many computers are the targets of hackers. There are sporting hackers who want to hackers demonstrate their intelligence by intruding into others’ computer systems as well as professional hackers who target systems for destruction or to copy and sell classified information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media New York
About this chapter
Cite this chapter
Strobel, S., Elling, V. (1997). Linux and security. In: Linux. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-1856-2_15
Download citation
DOI: https://doi.org/10.1007/978-1-4612-1856-2_15
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-94880-5
Online ISBN: 978-1-4612-1856-2
eBook Packages: Springer Book Archive