
4: Case Studies
55
unauthorised e-commerce facility in the heart of an
operations centre of one of its international
engineering plants. The unauthorised facility had
been populated with a large number of assets, which
were being made available to an external non-
company subscribed user base. Even worse, a
number of external non-company users were being
granted subscribed access to internal company assets
behind the perimeter firewall. This ‘environment’
was being used to store and distribute materials that
were classified under both the COPINE
1
and SAP
2
scales in the form of paedophilic images.
The on-site first responder who became aware ...