First page Back Continue Last page Image

Where Are The Security Weaknesses

This box represents

all computer resources

subject to attack

The majority of the

attacks (in the red box) are based on low technology which could be used by anyone

These red attacks require the user to have made a security mistake to work

The high technology attacks at the bottom represent weaknesses in the computer code and require more skill to implement