| |
Penetration and Countermeasure
Access sensitive information Encryption
Features not used Implement protection
Implied Sharing Capabilities
Parameters Check user supplied
Carelessness Employee Training
Passwords Proper Management
Repetition Hang up & Notify
Leakage Shielding, Encryption
|