Difference between revisions of "Unauthorised Access"
(Created page with "{{Scenario Type}}") |
|||
Line 1: | Line 1: | ||
− | {{Scenario Type}} | + | {{Scenario Type |
+ | |Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article]. | ||
+ | }} |
Revision as of 21:33, 24 November 2015
Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a Wired article.
Scenario Tasks of this Type
- 2 factor authentication
- Computer
- Data
- Find a reliable hosting provider
- How can I prevent getting a virus infection from an email
- How do I know if someone else is accessing my email account
- How to protect your phone from virus infection
- I want to be protected from malicious emails
- I want to destroy data
- I want to ensure that my data is never lost
- I want to prevent unauthorised access to my data
- I want to protect my computer from virus infection
- I want to protect my email account from unauthorised access
- I would like to prevent others from accessing my computer
- I'm worried someone is trying to lure me with a fake email (phishing)
- Minimising damage from a lost or stolen computer
- My Website
- Protect files and messages on my phone
- Reset passwords and security questions
- Social Network
- Test my site for vulnerabilities