14th- How does INTRUDERS pose a threat to the Information System?
INTRUDERS
Anyone who accesses equipment, electronic data, or files without proper authorization is an intruder.
Intruders who attack information systems for fun and challenge are known as hackers.
Other types:
A hacker might break into and either pilfer or damage the company's Web site.These lines are vulnerable to wiretapping, which may be done with even inexpensive devices that are capable of performing the task without giving any clues that the wire is being tapped.With this method,the penetrator intercepts legitimate information and substitutes fraudulent information in its place.Individuals who pose as someone else in order to defraud the company.Standard cathode-ray tubes (CRTs) used in common video display units emit electromagnetic interference (EMI) on a frequency capable of being picked up by an ordinary television set.
I am really impressed by this blog! Very clear explanation of issues and It Is Given IS open to everyone. accounting software
ReplyDelete