Tools and Ideas for Risk Assessment and Business Continuity
|21 August, 2014|
Use of an Apple iPod or similar USB device to illicitly copy information from a computer. The high data capacity of current devices and the convenience of USB ports makes it easy to surrepticiously copy large amounts of data.
Note that although Apple's iPod gave rise to the term, many devices apart from MP3 players provide USB storage which can be used to copy files, including digital cameras, mobile phones, PDA's, and even wrist watches.
You are welcome to use these definitions for any purpose provided that an acknowledgement is made
to www.riskythinking.com and (if you're using HTML) you provide a link back to this site.
Risky Thinking Newsletter
Are you responsible for Business Continuity, Disaster Recovery, or Risk Management in your organization? Then you may wish to receive a free subscription to the the monthly Risky Thinking Newsletter. It contains news, opinions and articles of interest to people working in these areas.
Recent articles have included:
© Albion Research Ltd. 2014