Describe how auditing software can detect unauthorised access and modification of data.

      

Describe how auditing software can detect unauthorised access and modification of data.

  

Answers


Lydia
An audit trail/log is maintained
It records which user has logged on
... at which terminal/workstation/node
... the log on/off times
... the data/files they accessed/modified

lydiajane74 answered the question on July 1, 2018 at 14:33


Next: Describe the main features of the OSI model.
Previous: Evaluate the use of videoconferencing

View More Computer Science Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions