Secure your Data by Breaking into IT!
In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a syste...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Srusti Academy of Management
2009-06-01
|
Series: | Srusti Management Review |
Online Access: | http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |