Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack

What will be an ideal response?


By watching legitimate users for a week, an intruder can determine what is
normal, accepted behaviors for each user. Then he can try to mimic that behavior so as
not to set off any intrusion alarms when he accesses the victim computer.

Computer Science & Information Technology

You might also like to view...

Which of the following is considered one of the biggest sources of malware (malicious software)?

A. the Internet B. a cloud library C. a hard disk D. a router

Computer Science & Information Technology

How does ping work? Be as specific as you can

What will be an ideal response?

Computer Science & Information Technology

The Envelope feature can insert the delivery address automatically if a letter is displayed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain the difference between bitmap and raster images.?

What will be an ideal response?

Computer Science & Information Technology