>The typical concern is that an unprivileged user may be able to persuade
a privileged user (e.g. some STC) to access data the unprivileged user
was not otherwise entitled to and/or to disclose that data to some third
party.

Now we're getting into the deliberate (read: malicious), rather than accidental 
access.
Social Engineering.

"Grounds for discipline, up to (and including) dismissal!"


-
-teD

I’m an enthusiastic proselytiser of the universal panacea I believe in!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to