|
Lines 152-158
Link Here
|
| 152 |
<para>Systems and networks can be accessed without permission, |
152 |
<para>Systems and networks can be accessed without permission, |
| 153 |
sometimes by accident, or by remote attackers, and in some |
153 |
sometimes by accident, or by remote attackers, and in some |
| 154 |
cases, via corporate espionage or former employees. As a user, |
154 |
cases, via corporate espionage or former employees. As a user, |
| 155 |
it is important to prepare for and admit when a mistake has lead |
155 |
it is important to prepare for and admit when a mistake has led |
| 156 |
to a security breach and report possible issues to the security |
156 |
to a security breach and report possible issues to the security |
| 157 |
team. As an administrator, it is important to know of the |
157 |
team. As an administrator, it is important to know of the |
| 158 |
threats and be prepared to mitigate them.</para> |
158 |
threats and be prepared to mitigate them.</para> |