Monday, 10 February 2014
Scene 1 - Exterior
(AKSHAY)
- For example, if a hacker enters your computer and steals
financial information such as your credit card number, or the password to your
bank account, they could use that information to make purchases.
- We are live outside the house of Robert Jason, the
man being accused of one of the largest hacking scandals this year and we have been given access to his property.
Scene 2 – Interior
VOICE OVER
(AKSHAY)
- Mr Jason was caught trying to break into the most secure
online virtual vault in an attempt to embezzle a large quantity of the highly
valuable BitCoin.
- Police believe that they have had a stroke of luck as
evidence suggests that the self-taught hacker was conspiring to hack several
other online systems in a string of devastating attacks on several large
corporations. The extensive list includes Chromecast, Prime, Apple, ThinkGeek
and Ebay. So if this man could single handily commit such a hanus digital crime
how hard could it really be?
Scene 3 - Interview with the head of security for
Question 1 - What in which do you as head of security, ensure that they companies files and data are not hacked and accessed by an outsider?
Answer 1 - We as a company have a database called... which monitors and records the activity of every worker within the setup. We also have reminder and pop ups that inform us of what each employ is meant to be doing within the setup therefore as soon as something goes wrong, an urgent alarm is sent to all of the directors within our company allowing us to put a stop to this activity.
Question 2 - How effective has the software been for your company and have you had any recent encounters of hackers trying to access your data?
Answer 2 - So far since i have been at the company we haven't had any encouter with possible hackers which is good, we often run monthly tests of the system to ensure that there are no faults within it and it still works to its full potential.
Question 1 - What in which do you as head of security, ensure that they companies files and data are not hacked and accessed by an outsider?
Answer 1 - We as a company have a database called... which monitors and records the activity of every worker within the setup. We also have reminder and pop ups that inform us of what each employ is meant to be doing within the setup therefore as soon as something goes wrong, an urgent alarm is sent to all of the directors within our company allowing us to put a stop to this activity.
Question 2 - How effective has the software been for your company and have you had any recent encounters of hackers trying to access your data?
Answer 2 - So far since i have been at the company we haven't had any encouter with possible hackers which is good, we often run monthly tests of the system to ensure that there are no faults within it and it still works to its full potential.
Subscribe to:
Post Comments
(Atom)
0 comments:
Post a Comment