Principles and Theory of Security Management
Question 1. think of some intrusions - the disgruntled mailman flying onto the Capitol lawn on his gyrocopter and remember the couple who crashed a White House function a few years ago? What are other examples of intrusions to political or social or business venues? How were they able to happen? What problems could they have caused - and what problems in access processes came to light?
Question 2. ave you heard of Certified Ethical Hackers? Who are they? What do they do?