Secure your Data by Breaking into IT!
In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a syste...
Main Author: | Sumanjit Das |
---|---|
Format: | Article |
Language: | English |
Published: |
Srusti Academy of Management
2009-06-01
|
Series: | Srusti Management Review |
Online Access: | http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |
Similar Items
-
Christ Would Break Your Tongue
by: Sheila Stewart
Published: (2018-03-01) -
Can a pneumothorax break your heart?
by: Stylianos Mavridis, et al.
Published: (2015-04-01) -
Can a bank crisis break your heart?
by: Meissner Christopher M, et al.
Published: (2008-01-01) -
WHAT’S IN YOUR PROFILE? MAPPING FACEBOOK PROFILE DATA TO PERSONAL SECURITY QUESTIONS
by: Jamie Pinchot, et al.
Published: (2012-01-01) -
For your information: Furthering order concerning security
Published: ()