RMG 300 Lecture Notes - Lecture 5: Hacker International, Network Administrator, Data Security
Document Summary
Org and more vulnerable today: all of this connectivity and interdependence affects this, connect computers. Interdependence: data storage, networked, hardware capabilities, smaller, faster, cheaper computers and storage devices, more tools available for the hacker, easier to be a computer hacker. Social engineering: sending emails from a supposed reliable source. Impersonation: pretending to be a company manager of an is employee, tailgating, following behind an employee to enter restricted areas, shoulder surfing, watching over so(cid:373)eo(cid:374)e"s shoulder to (cid:448)ie(cid:449) data or pass(cid:449)ords. Theft of equipment: data security breaches, equipment is very small now (e. g. 32gb usb) can be taken easily. Identity theft: stealing physical mail, dumpster diving: finding sensitive trash, stealing personal information in computer databases. Infiltrating organizations that store large amounts of personal info (e. g. data aggregators such as. Impersonating a trusted organization in an electronic communication (phishing) Protection of intellectual property: piracy, copying a software program without making payment to the owner, trade secret, e. g.