Show simple item record

dc.contributor.author Fernando, MSD
dc.contributor.author Jahankhani, H
dc.contributor.author Nkhoma, MZ
dc.date.accessioned 2017-01-19T05:52:40Z
dc.date.available 2017-01-19T05:52:40Z
dc.identifier.uri http://dl.lib.mrt.ac.lk/handle/123/12265
dc.description.abstract In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee” that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network security is implemented. However, this implementation depends on the network designers at the initial stage and the network administrators in the long term. Initial security level designed can be later changed, improved or compromised by the network administrators who look after day-to-day network and system functions. Their competencies and the motivation contribute in achieving the desired security objectives that are aligned with the business goals. Incompetent network administrator may pave the way to attacks that could take place either at once where an obvious vulnerability may exist or in several phases where it requires information gathering or scanning in order to enter into the target system. De-motivated network administrator may ignore the possible threats or find strategies to make his/ her presence vital for the existence of the network services. The latter may be an example of a competent network administrator who is not rewarded due to the lapses of the senior management, in which case backdoors or logic bombs may be deployed so that the administrator may take vengeance in case the career is terminated or someone else is given undue recognition. Two studies on real cases given in this paper highlights the influence of such network administrators. To preserve the confidentiality, the names of personnel or organizations are not revealed. en_US
dc.relation.uri https://pdfs.semanticscholar.org/5a3e/5a280e66d13e63a087dc0b8e85e41ed04228.pdf en_US
dc.source.uri https://pdfs.semanticscholar.org/5a3e/5a280e66d13e63a087dc0b8e85e41ed04228.pdf en_US
dc.title Cases of Network Administrator Threats en_US
dc.identifier.year 2009 en_US
dc.identifier.email shantha@cse.mrt.ac.lk en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record