Chapter 18 Intrusion Methods

physical: getting onsite and stealing
technical: via networked systems
social: conning

Technical: hacking now "point and hack" "script kiddies"

Physical: greater distribution of info makes physical security more complex
locks, video surveillance, guards
home office systems & networks not as secure as business office
on the road: laptops with current info; access to corporate network

Social engineering: gaining confidence of others, socializing, trust
selecting those with access or willingness
motivation: greed, revenge, morality, group loyalty, recognition