Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Kleiman D., Cardwell K., Clinton T. — The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators
Kleiman D., Cardwell K., Clinton T. — The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators

Авторы: Kleiman D., Cardwell K., Clinton T.

Аннотация:

As is often the case with security compromises, it's not a matter of fyour company will be
compromised, but when.
If I had known the employee I hired was going to resign, break into my office, and damage
my computers in the span of three days, hindsight being 20/20, I would have sent notification
to the security guards at the front door placing them on high alert and made sure he was not
granted access to the building after he resigned. Of course, I in hindsight, I should have done a
better job of hiring critical personnel .He was hired as a computer security analyst and security
hacker instructor; and was (or should have been) the best example of ethical conduct.
Clearly, we see only what we want to see when hiring staff and you won't know whether
an employee is ethical until a compromise occurs. Even if my blinders had been off, I would
have never seen this compromise coming. It boggles the mind to think that anyone would ruin
or jeopardize his career in computer security for so little. But he did break into the building,
and he did damage our computers; therefore, he will be held accountable for his actions, as
detailed in the following forensic information. Pay attention when the legal issues are reviewed.
You will learn bits and pieces regarding how to make your life easier by knowing what you
really need to know "when" your computer security compromise occurs.


Язык: en

Рубрика: Разное/

Статус предметного указателя: Неизвестно

ed2k: ed2k stats

Год издания: 2007

Количество страниц: 932

Добавлена в каталог: 26.08.2017

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте