Get premium membership and access questions with answers, video lessons as well as revision papers.

Describe how auditing software can detect unauthorised access and modification of data.

      

Describe how auditing software can detect unauthorised access and modification of data.

  

Answers


Lydia
An audit trail/log is maintained
It records which user has logged on
... at which terminal/workstation/node
... the log on/off times
... the data/files they accessed/modified

lydiajane74 answered the question on July 1, 2018 at 14:33


Next: Describe the main features of the OSI model.
Previous: Evaluate the use of videoconferencing

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions