Potential Offenders
Potentially everyone.
Methods of Detection
Analysis of audit logs and journals (e.g., a log shows that an authorized user apparently logged in, but it is known that the person was away at that time).
Observation (e.g., an eyewitness saw an intruder at an authorized user's terminal).
Password violations (e.g., a log shows repeated failed attempts to use an invalid password).
Report by the person who has been impersonated (e.g., the authorized person logs in, and the system tells him that he has had six unsuccessful logins since the last time he knows he actually logged in).
Evidence
Backups.
System audit logs.
Telephone company records (pen register and dialed number recorder (DNR) records).
Violation reports from access control packages.
Notes and documents found in the possession of suspects.
Witnesses.
Excessively large phone bills (excessive message units may indicate that someone is using resources).
Kavungya answered the question on May 17, 2019 at 08:51
- Describe the ways of detecting Wiretapping and Eavesdropping.(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted: May 17, 2019. Answers (1)
- Describe Dumpster Diving.(Solved)
Describe Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- Explain the measures to fight unethical use of ICT.(Solved)
Explain the measures to fight unethical use of ICT.
Date posted: May 17, 2019. Answers (1)
- Describe the data protection act.(Solved)
Describe the data protection act.
Date posted: May 17, 2019. Answers (1)
- State the sources of ICT legislation.(Solved)
State the sources of ICT legislation.
Date posted: May 17, 2019. Answers (1)
- Outline the types of workplace conflicts.(Solved)
Outline the types of workplace conflicts.
Date posted: May 17, 2019. Answers (1)
- Give the effects of conflicts in organizations.(Solved)
Give the effects of conflicts in organizations.
Date posted: May 17, 2019. Answers (1)
- State and explain the methods of dealing with conflicts.(Solved)
State and explain the methods of dealing with conflicts.
Date posted: May 17, 2019. Answers (1)
- List the techniques of reducing conflicts.(Solved)
List the techniques of reducing conflicts.
Date posted: May 17, 2019. Answers (1)
- Explain the techniques of stimulating conflicts.(Solved)
Explain the techniques of stimulating conflicts.
Date posted: May 17, 2019. Answers (1)
- List the ways on how to solve interpersonal conflicts.(Solved)
List the ways on how to solve interpersonal conflicts.
Date posted: May 17, 2019. Answers (1)
- Describe E-Environment.(Solved)
Describe E-Environment.
Date posted: May 17, 2019. Answers (1)
- Describe E-Health.(Solved)
Describe E-Health.
Date posted: May 17, 2019. Answers (1)
- Describe E-Government.(Solved)
Describe E-Government.
Date posted: May 17, 2019. Answers (1)
- Describe cloud computing.(Solved)
Describe cloud computing.
Date posted: May 17, 2019. Answers (1)
- Describe E-Agriculture.(Solved)
Describe E-Agriculture.
Date posted: May 17, 2019. Answers (1)
- Describe technology transfer.(Solved)
Describe technology transfer.
Date posted: May 17, 2019. Answers (1)
- State the Types of Technology Transfer.(Solved)
State the Types of Technology Transfer.
Date posted: May 17, 2019. Answers (1)
- Briefly describe the history of computers.(Solved)
Briefly describe the history of computers.
Date posted: May 17, 2019. Answers (1)