Watch for Hackers
Steps to break into a DSS
Gather information
User names, phone numbers, office locations
Attempt to get a login account
Make changes to gain access or control of the system
Previous slide
Next slide
Back to first slide
View graphic version