Difference between revisions of "Unauthorised Access"

Line 1: Line 1:
 
{{Scenario Type
 
{{Scenario Type
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
+
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
 
}}
 
}}

Revision as of 21:34, 24 November 2015



Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this Wired article.

Scenario Tasks of this Type