Get premium membership and access questions with answers, video lessons as well as revision papers.
a). Eavesdropping:
This is tapping into communication channels to get information, e.g., Hackers mainly use eavesdropping to obtain credit card numbers.
b). Surveillance (monitoring):
This is where a person may monitor all computer activities done by another person or people.
The information gathered may be used for different purposes, e.g., for spreading propaganda or sabotage.
c). Industrial espionage:
Industrial espionage involves spying on a competitor so as to get or steal information that can be used to finish the competitor or for commercial gain.
The main aim of espionage is to get ideas on how to counter by developing similar approach or sabotage.
d). An employee who is not supposed to see some sensitive data gets it, either by mistake or design.
e). Strangers who may stray into the computer room when nobody is using the computers.
f). Forced entry into the computer room through weak access points.
g). Network access in case the computers are networked & connected to the external world.
francis1897 answered the question on March 14, 2023 at 13:02