HelpNetSecurity: Security in an ERP World
May 26, 2004, 07:00 (1 Talkback[s])
(Other stories by Mark Van Holsbeck, Jeffrey Z. Johnson)
[ Thanks to LogError for this link.
"Every good hacker story ends with the line: 'and then he's got
root access to your network and can do whatever he wants.' But the
story really doesn't end there. This is just the beginning of the
real damage that the hacker can inflict.
"While most information security initiatives focus on perimeter
security to keep outsiders from gaining access to the internal
network, the potential for real financial loss comes from the risk
of outsiders acting as authorized users to generate damaging
transactions within business systems..."