ABSTRACT

Computer network penetration frauds are mentioned in the media because they are typically related to the theft of personal financial information such as credit card data or, in the US, social security numbers. None of the supply chain frauds required hacking the organization's network in order to perpetrate them, they were all performed by employees who had access to the organization's business software applications. For the typical person who goes into an office, one of the morning activities will be to sign on to the organization's computer network. It is the network security that controls a user's ability to access data files, folders, software applications, and devices across the enterprise. Hardware appliances and software firewalls are used to keep outside entities from gaining access to network infrastructure as a front line of defense. Identity management means that all users should have a unique identifier and password that allows them access to the network or the individual software applications.