Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees.
A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a “magazine article”.
During the interview she flirted a lot with the sysadmin and while leaving she “accidentally” left her pen drive at the sysadmin’s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily.
Who is liable? The persons who steal the information as well as the persons who misuse the stolen information.

1 comments:

This is very common incident and from the time security is paid attention over computer network negative people are in search of a way to break ever measure.

Post a Comment

Cyberlaw

Cyberlaw

About this blog

This blog is about cyberlaw

Labels

About Me

My photo
Hello my friends my name is Mehran ,I'm going to write about cyberlaw. This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the web-log owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this web-log and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Followers

Labels


Labels

Search This Blog


Labels