Abstract
Contrary to popular belief, hacking is not an art, it’s exploitation. We may think of hacking as geeks locked away in dark rooms breaking into your defenceless system. That’s not really the case. It’s not your computers that are the weakest part
of your IT infrastructure – it’s you!
of your IT infrastructure – it’s you!
Original language | English |
---|---|
Pages | 20-21 |
Number of pages | 2 |
Volume | 41 |
No. | 5 |
Specialist publication | The Bulletin (Law Society of South Australia) |
Publication status | Published - Jun 2019 |
Keywords
- DATA PROTECTION
- ELECTRONIC MAIL
- INFORMATION TECHNOLOGY
- COMPUTER SECURITY
- CYBERSECURITY
- Authentication
- Electronic mail systems--Security measures
- Computers--Access control--Passwords
- Hacking
- Computers--Access control--Keystroke timing authentication