Difference between revisions of "Unauthorised Access"

Dmitri (Talk | contribs)
Dmitri (Talk | contribs)
 
Line 1: Line 1:
 
{{Scenario Type
 
{{Scenario Type
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
+
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article]. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc.
 
}}
 
}}

Latest revision as of 21:43, 24 November 2015

Last modified 9 years ago
Cancel

Help improve this page!

Cancel

Keep track of this page and all changes to it.