'Guard your front door' & other steps to improve your online security

Mark Ferraretto

Research output: Contribution to specialist publicationArticle

Abstract

Contrary to popular belief, hacking is not an art, it’s exploitation. We may think of hacking as geeks locked away in dark rooms breaking into your defenceless system. That’s not really the case. It’s not your computers that are the weakest part
of your IT infrastructure – it’s you!
Original languageEnglish
Pages20-21
Number of pages2
Volume41
No.5
Specialist publicationThe Bulletin (Law Society of South Australia)
Publication statusPublished - Jun 2019

Keywords

  • DATA PROTECTION
  • ELECTRONIC MAIL
  • INFORMATION TECHNOLOGY
  • COMPUTER SECURITY
  • CYBERSECURITY
  • Authentication
  • Electronic mail systems--Security measures
  • Computers--Access control--Passwords
  • Hacking
  • Computers--Access control--Keystroke timing authentication

Fingerprint

Dive into the research topics of ''Guard your front door' & other steps to improve your online security'. Together they form a unique fingerprint.

Cite this