Changes

Jump to navigation Jump to search
Line 26: Line 26:  
Security issues may include:
 
Security issues may include:
 
*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
 
*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
*Unsecured Networks - connecting on networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.  
+
*Unsecured Networks - connecting to networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.  
*Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised.
+
*Providing Internal Access Externally - servers will be exposed to the internet therefore increasing the potential risk and vulnerability of being compromised.
 
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
 
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
 
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.
 
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.

Navigation menu

GCwiki