Home » Research » About » IT vs OT | When Facing The Insider Threat | What Happend | Free Software vs Open Source | ask me |
What if? If a pretender could be ANYONE...
How Did You Discover Linux? | Insider threat tactics
· Priscilla Felicia Harmanus · 1993 from the Netherlands · Last update: 21 juli 2020
No one knows who I am yet and what kind
of content I produce. So why not focus a topic that
people are already searching for, right?
CUEBALL: "So, do you know what Ubuntu is?"
CUEBALL: "It's an operating system for computers. It's free and you can download it from their website."
PRISCILLA: "And why would I want to download it? :confused:"
CUEBALL: "Well, it's got a lot of advantages. It's, well, free...it's very customizable, gets no spyware or viruses, open source etc."
PRISCILLA: "Really? No viruses?"
CUEBALL: "Nope, unless you try extremely hard to get one."
PRISCILLA: "Cool...I'll look it up."
If a pretender could be ANYONE...
then you could have so many and interesting episodes that
the show could last for a long time. In the workplace, the hacker or insider can
simply walk in the door, like in the movies, and pretend to be a maintenance worker or
consultant who has access to the organization. Then the intruder struts through the
office until he or she finds a few passwords lying around and
emerges from the building with ample information to
exploit the network from home later that night. However, it isn’t
convenient or even remotely easy for some people to just
switch operating systems at the bat of an eye.
tablet or all three if you're 18 you
and that means you already
know things that older generations have
had to be trained on.
want to know hey, what is going on, I wanna know.
What Happens When Your Power Goes Out? This is a new web page... Could this happen to you?
It used to be that when you bought an appliance, you owned it, and you could take it apart, repair it, and plug in whatever accessories you wanted without the manufacturer's knowledge or permission.
Nowadays, software enables devices to do new, useful things, but it also enables manufacturers to exert more control than ever before over their customers. Manufacturers use software to ensure a device serves their financial interests throughout its lifetime, forcing you to go to an authorized repair shop, buy official parts, and stay out of the secret workings of the device that would let you know what it's doing with the data it collects about you.
PRISCILLA: For insider threat tactics, I have a message to share. If a pretender could be ANYONE... then you could have so many and interesting episodes that the show could last for a long time. To achieve something in the cyber security industry such as creating awareness for her fixation target. This is what the story would be about. I want to convey a good clear message with the aim that "Insider threat tactics" are easily and quickly understood and recognized. This message may have a meaning consisting of a combination of Hardware vs Software, Ubuntu / Linux "GNU is Not Unix, ICS / SCADA, Free Software vs Open Source, IT / OT, physical vs analog/digital and social/reverse engineering which reveals sophisticated high level skilled advanced operating techniques that includes practical knowledge and hands on experience is required. This is my message for Insider threat tactics, human error for your company, coding the law within our government and gmail beta for grandma’s home/small office. It takes place in the present, past and back to the future. Additional Key Words and Phrases: Insider threat, malicious insider threat, unintentional insider threat, masqueraders, traitors, grounded theory for rigorous literature review, 5W1H questions.