Difference between revisions of "Unauthorised Access"
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Scenario Type | {{Scenario Type | ||
− | |Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in | + | |Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article]. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc. |
}} | }} |
Latest revision as of 21:43, 24 November 2015
Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this Wired article. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc.
Scenario Tasks of this Type
- 2 factor authentication
- Computer
- Data
- Find a reliable hosting provider
- How can I prevent getting a virus infection from an email
- How do I know if someone else is accessing my email account
- How to protect your phone from virus infection
- I want to be protected from malicious emails
- I want to destroy data
- I want to ensure that my data is never lost
- I want to prevent unauthorised access to my data
- I want to protect my computer from virus infection
- I want to protect my email account from unauthorised access
- I would like to prevent others from accessing my computer
- I'm worried someone is trying to lure me with a fake email (phishing)
- Minimising damage from a lost or stolen computer
- My Website
- Protect files and messages on my phone
- Reset passwords and security questions
- Social Network
- Test my site for vulnerabilities