First page Back Continue Last page Image
Where are the Security Weaknesses
- This Box Represents
- all computer Resources
- subject to attack
- The majority of the
- Attacks (in the red box) are based on Low technology which could be used by anyone
- These red attacks require the user to have made a security mistake to work
- The High technology attacks at the bottom represent weaknesses in the computer code and require more skill to implement