Difference between revisions of "Unauthorised Access"

(Created page with "{{Scenario Type}}")
 
Line 1: Line 1:
{{Scenario Type}}
+
{{Scenario Type
 +
|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].
 +
}}

Revision as of 21:33, 24 November 2015



Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a Wired article.

Scenario Tasks of this Type