Examples of Unauthorized Access
| The following are additional examples of malicious insider activities in order to obtain unauthorized access: - Asking to “borrow” or taking another employee’s badge.
- Trying to “piggyback” by following another individual through access doors.
- Logging on to a computer using a co-worker’s password or credentials.
|
|