Difference between revisions of "Unauthorised Access"

 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
{{Scenario Type
 
{{Scenario Type
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
+
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article]. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc.
 
}}
 
}}

Latest revision as of 21:43, 24 November 2015



Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this Wired article. There are many ways in which someone may gain unauthorized access to your accounts or devices including: cracking your password through profiling or brute-force attacks, social engineering, installing malware on your device, etc.

Scenario Tasks of this Type