Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees.
A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a “magazine article”.
During the interview she flirted a lot with the sysadmin and while leaving she “accidentally” left her pen drive at the sysadmin’s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily.
Who is liable? The persons who steal the information as well as the persons who misuse the stolen information.
1 comments:
This is very common incident and from the time security is paid attention over computer network negative people are in search of a way to break ever measure.
Post a Comment