Monday, 10 February 2014
Scene 1 - Exterior

(AKSHAY)

- A hacker may break into a system just out of curiosity or for the challenge. But with the development and growing dependency of the digital age it is more likely that they are breaking in to access data, usually because the data has value.
- For example, if a hacker enters your computer and steals financial information such as your credit card number, or the password to your bank account, they could use that information to make purchases.
- We are live outside the house of Robert Jason, the man being accused of one of the largest hacking scandals this year and we have been given access to his property.

Scene 2 – Interior


VOICE OVER
(AKSHAY)

- Mr Jason was caught trying to break into the most secure online virtual vault in an attempt to embezzle a large quantity of the highly valuable BitCoin.
- Police believe that they have had a stroke of luck as evidence suggests that the self-taught hacker was conspiring to hack several other online systems in a string of devastating attacks on several large corporations. The extensive list includes Chromecast, Prime, Apple, ThinkGeek and Ebay. So if this man could single handily commit such a hanus digital crime how hard could it really be?

Scene 3 - Interview with the head of security for 

Question 1 - What in which do you as head of security, ensure that they companies files and data are not hacked and accessed by an outsider?

Answer 1 - We as a company have a database called... which monitors and records the activity of every worker within the setup. We also have reminder and pop ups that inform us of what each employ is meant to be doing within the setup therefore as soon as something goes wrong, an urgent alarm is sent to all of the directors within our company allowing us to put a stop to this activity.

Question 2 - How effective has the software been for your company and have you had any recent encounters of hackers trying to access your data?

Answer 2 - So far since i have been at the company we haven't had any encouter with possible hackers which is good, we often run monthly tests of the system to ensure that there are no faults within it and it still works to its full potential. 






0 comments:

Post a Comment