A Guide To
Employees pose a real risk in this area. Information can now be stolen using a variety of mechanisms including:
· Hard copy printed reports;
· Data files e-mailed to private mail boxes across the Internet from corporate systems;
· The use of high volume data devices such as disks, tapes or memory sticks;
· The use of commercially available compression software to reduce the size of the file.
Methods that prevent such activities include:
· Monitoring print queues to identify very large print runs;
· Introducing software which prevents data which has been copied to a removable storage device from being read by computers outside the organisation;
· Having a policy and mechanism to use a centralised Internet gateway. This gateway will only allow access to trusted computers and e-mail addresses;
· Monitoring call logging systems to identify high volume traffic and access to unauthorised sites.
Hackers use a number of different techniques to gather information to penetrate systems and networks.
An Introduction to Computer Crime