1 THE NEED FOR INFORMATION RISK MANAGEMENT
Before we begin to study further the need for information risk management, let us take a look at a few case studies to illustrate instances in which information was accessed or used inappropriately.
CASE STUDY 1
The hacker finished his coffee, checked the code one last time, and pressed the ‘execute’ button. As the egg-timer icon appeared on his computer screen, he turned out the light and went to bed. The computer churned away for hours whilst he slept, and finally flashed a ‘completed’ message on the screen.
It had taken him several hours to write the code, but he had finally succeeded. ...