How do fraudsters rationalize their actions, and do they feel guilt, stress, or even excitement when they actually cross that line into breaking the law? Read their answers to these questions and more.
Such a system is rife with opportunities for unintended and undesirable information disclosures. It needlessly multiplies the opportunities for social "phishing" attacks directed against government users. It is, frankly, an information catastrophe waiting to happen.
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
It seems to just be "understood" that if you're accepting favors you're doing so because the vendor expects to influence you and that you've compromised yourself if you start down that path. During the course of my career, I've seen only a couple of incidents of this type.