Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into?
Using the Web, research Mafiaboy’s exploits. When and how did he compromise sites? How was he caught?
Search the Web for “The Official Phreaker’s Manual.” What information in this manual might help a security administrator to protect a communications system?
The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information about threats and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on “threats.”
Using the categories of threats mentioned in this chapter and the various attacks described, review several current media sources and identify examples of each threat.The Need for Security
Is it important to build a conducive and positive culture in workplaces, and why?