Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

Practical Internet Security pp 211–224Cite as

  1. Home
  2. Practical Internet Security
  3. Chapter
How Masqueraders Infiltrate a System

How Masqueraders Infiltrate a System

  • Chapter
  • 1209 Accesses

Summary and Conclusions

The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.

Keywords

  • Short Message Service
  • Internet Service Provider
  • Malicious Code
  • Bush Administration
  • General Staff

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Yashwant Deva, “Cyber Surveillance: Threats and New Technologies,” Aakrosh, Forum for Strategic and Security Studies, [Strategic Affairs (Stratmag.com) is an unofficial Defence website, which is not endorsed or recognized by any Government or its institutions. All the material published on this site is in the public domain. The views represented in this site are those of the authors alone.], 2004.

    Google Scholar 

  2. John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition, Charles River Media, 2005.

    Google Scholar 

  3. Kevin McLaughlin, “RFID Tags May Provide New ‘In’ For Hackers,” CRN, Copyright © 2006 CMP Media LLC, CMP Media LLC, 600 Community Drive, Manhasset, New York 11030, page 57, March 27, 2006.

    Google Scholar 

  4. John R. Vacca, Guide to Wireless Network Security, Springer, 2006.

    Google Scholar 

  5. John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.

    Google Scholar 

  6. John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2007). How Masqueraders Infiltrate a System. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_12

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-0-387-29844-3_12

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-40533-9

  • Online ISBN: 978-0-387-29844-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2024 Springer Nature