1. Contributing User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Jul 2013
    Manila, Philippines
    Rep Power

    Question Information Security - Attacks

    Scenario 1:
    An employee at Company X is looking at shared documents on the company's fileserver and notices some discrepancies that indicate that one of the executives is embezzling money. He uses this information to blackmail the executive.

    Scenario 2:
    An employee at Company X breaks into an executive's computer account and finds a file there which indicates that the executive is embezzling money. He uses this information to blackmail the executive.

    In both scenarios, the executive was blackmailed, but in the world of computing, which is considered a security attack?
  2. #2
  3. Sarcky
    Devshed Supreme Being (6500+ posts)

    Join Date
    Oct 2006
    Pennsylvania, USA
    Rep Power
    only the one in which an attack has taken place. If no security procedures were broken and no systems were compromised (or accessed without permission) then there was no attack. only scenario 2 would be considered an attack.

    Comments on this post

    • kathy025 agrees : Thank you.
    HEY! YOU! Read the New User Guide and Forum Rules

    "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin

    "The greatest tragedy of this changing society is that people who never knew what it was like before will simply assume that this is the way things are supposed to be." -2600 Magazine, Fall 2002

    Think we're being rude? Maybe you asked a bad question or you're a Help Vampire. Trying to argue intelligently? Please read this.

IMN logo majestic logo threadwatch logo seochat tools logo