15/06/2016
Common use of information systems can set the security of the information of the organizations into risk. Several ways exist that do not require any external attack but only exploiting the information users put on internet voluntarily. It is a must to wake up the conscience about the existence of these ways and the multiple forms to obtain this information to minimize the risks they can pose to the security of the information.
Author: David Ramírez Morán
THIS DOCUMENT IS ONLY AVAILABLE IN SPANISH LANGUAGE.