Difference between revisions of "Unauthorised Access"

Dmitri (Talk | contribs)
Dmitri (Talk | contribs)
Line 1: Line 1:
 
{{Scenario Type
 
{{Scenario Type
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
+
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
 
}}
 
}}

Revision as of 21:34, 24 November 2015



Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this Wired article.

Scenario Tasks of this Type

Last modified on 24 November 2015, at 21:34