The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.
Kevin MitnickSo the ethic I was taught in school resulted in the path I chose in my life following school.
Kevin MitnickI get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
Kevin MitnickMy primary goal of hacking was the intellectual curiosity, the seduction of adventure.
Kevin Mitnick