Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack
What will be an ideal response?
By watching legitimate users for a week, an intruder can determine what is
normal, accepted behaviors for each user. Then he can try to mimic that behavior so as
not to set off any intrusion alarms when he accesses the victim computer.
Computer Science & Information Technology
You might also like to view...
Which of the following is considered one of the biggest sources of malware (malicious software)?
A. the Internet B. a cloud library C. a hard disk D. a router
Computer Science & Information Technology
How does ping work? Be as specific as you can
What will be an ideal response?
Computer Science & Information Technology
The Envelope feature can insert the delivery address automatically if a letter is displayed.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Explain the difference between bitmap and raster images.?
What will be an ideal response?
Computer Science & Information Technology