CSC 426 Chapter 4

Helpfulness: 0
Set Details Share
created 3 months ago by cla475084
1 view
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:
1

Dumpster Diving

Process of going through target's trash, not unique to computer community. Police and other investigators have used this

2

Installing Unauthorized Hardware and Software

Establish a policy that restricts users installing software and new hardware on their system

3

Physical Access by Non-Employees

If an attacker can gain physical access, the attacker can penetrate the computer systems and networks

4

People as a security tool

People can be effective: policies and procedures, training and awareness, many eyes, challenge visitors, report abnormal conditions