Scenario Type Description
|
Access to a protected resource without per … Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article]. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc.g, installing malware on your device, etc.
|
---|