This preview shows page 1. Sign up to view the full content.
Unformatted text preview: lan its incident response so the program can respond to security incident. They use a scenario analyses and brainstorming. ""tudents hac nto ic omputer sssttm ea t xupprt ei s ch no ool" The students found an nternet program that targets indowssbased networr s nad ere able to w discover the schooll passwordss ss s s a idGe s l nn vvnss a F mont Union Gigh chool Districtt re s strategic business and communittmanagerr o ch ool o fficia ls l ea rn ed o t f he b r each a n d fixed the ssstemm vulnn reabi itt s l t
http://findarticles.com/p/articles/mi_qn4176/is_20071216/ai_n21165444/ Gomeland ecuritt pDrtment's paonehe e sssttm hac ed This article is about a hac er wbo eroo anto h i telephone ssstem belonging to the Gomeland p ec ur i tt De a p rtm e nt r ac edup b out i ra n international callss Telecommunications securittadministrators now are able to configure securittsettings to avoid such incidentss These safeguards will protect customers' information from future hacking incidents. httpp p p www...
View Full Document
This note was uploaded on 06/30/2011 for the course BISM 3100 taught by Professor Geist during the Spring '08 term at Kennesaw.
- Spring '08