Shoulder surfing can occur any place a person is accessing CONFIDENTIAL information
Controls IMPLEMENTED to mark the boundaries of an organization's virtual territory GIVING notice to trespassers that they are encroaching on the organization's cyberspace
Hackers uses skill, GUILE, or fraud to steal the property of someone else.