Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall in to?
Answer to relevant QuestionsUsing the Web, research Mafia boy’s exploits. When and how did he compromise sites? How was he caught?What is civil law, and what does it accomplish?Which 1997 law provides guidance on the use of encryption?What can be done to deter someone from committing a crime?What value does an automated asset inventory system have for the risk identification process?
Post your question