Penetration and Countermeasure

Access sensitive information Encryption


Features not used Implement protection

Implied Sharing Capabilities

Parameters Check user supplied

Line disconnect Hang up

Carelessness Employee Training

Passwords Proper Management

Repetition Hang up & Notify

Leakage Shielding, Encryption

Waste Destroy

Previous slide Next slide Back to first slide View graphic version