Potential Vulnerability | Data Storage | Hacking, unauthorized access | Organization and customer information compromised | User terminal | Social engineering, shoulder surfing | See users access information, getting a user to unknowingly give your access information | Server | Hacking, malware, viruses, Trojan horses | Disruptive system operations, Backdoor access, key stroke recording | Web site | Hacking, viruses, unauthorized access | Information being accessed, unknowingly installing viruses…
Words 2153 - Pages 9