Describe the ways of detecting Masquerading.

      

Describe the ways of detecting Masquerading.

  

Answers


Kavungya
Potential Offenders
Potentially everyone.
Methods of Detection
Analysis of audit logs and journals (e.g., a log shows that an authorized user apparently logged in, but it is known that the person was away at that time).
Observation (e.g., an eyewitness saw an intruder at an authorized user's terminal).
Password violations (e.g., a log shows repeated failed attempts to use an invalid password).
Report by the person who has been impersonated (e.g., the authorized person logs in, and the system tells him that he has had six unsuccessful logins since the last time he knows he actually logged in).
Evidence
Backups.
System audit logs.
Telephone company records (pen register and dialed number recorder (DNR) records).
Violation reports from access control packages.
Notes and documents found in the possession of suspects.
Witnesses.
Excessively large phone bills (excessive message units may indicate that someone is using resources).
Kavungya answered the question on May 17, 2019 at 08:51


Next: Describe the ways of detecting Wiretapping and Eavesdropping.
Previous: Describe the ways of detecting Software Piracy.

View More Introduction to ICT Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions