Travel Reference
In-Depth Information
the tricks. First they will try the user's birth date, then that of the spouse
or children. Then the same numbers in reverse. Then combinations like
the user's birth date combined with the spouse's birth month and child's
birth date. Randomly generated passwords prevent this kind of guesswork
from being successful.
One approach that is used by many governmental agencies is the
actual removal of computer hard drives. All work is stored on a disk that
is secured at the end of the day. This denies sensitive information to
anyone who manages to gain access to the computer.
Remember, while many computer systems are secure, the transmission
lines into them are not. This is especially true overseas, as we discussed
above. Because virtually all corporate information is found in the corpo-
rate database and because the volume of information transmitted via com-
puter e-mail is increasing at an exponential rate, the targeting of computer
systems is the fastest-growing choice of intelligence-gathering organiza-
tions. Installation by experienced professionals is your only means to
secure your system against such intrusion.
NOTES
1.
Sun Tzu, The Art of War, translated from the Chinese by Lionel Giles, 1910.
2.
Address by former FBI director Louis Freeh to the Executive's Club, Chicago,
IL, February 17, 1994.
Search WWH ::




Custom Search