March 2021
Intermediate to advanced
400 pages
14h 24m
English
Information theft is an obvious threat to any network. Even with Bluetooth devices, it can be a problem. Stealing digital information is not quite the same as stealing a physical object, however. It does not restrict, curtail, or prevent the rightful owner from accessing the information. That is, the data thieves don’t remove the information; they simply copy it. Although this is a crime, the original asset is left intact.
What may be of more concern on some occasions is when attackers modify data in some way for their own gain. For example, a student might change their grade by modifying database fields in a school’s system. Or an attacker with a criminal record might attempt to corrupt or delete ...