Describe the ways of detecting scanning attacks.

      

Describe the ways of detecting scanning attacks.

  

Answers


Kavungya
Potential Offenders
- Malicious intruders.
- Spies attempting to access systems for targeted data.
- Criminals intent on committing fraud.
Methods of Detection
- Computer logs that show when telephone calls were received by the computer and when attempts were made.
- Loss of data or transfer of funds or other assets.
- Telephone company records.
Evidence
- Telephone company records (pen register and dialed number recorder (DNR) records).
- Possession of war dialing programs.
- Computer logs.
- Possession of information compromised as a result of scanning, including lists of telephone numbers.
Kavungya answered the question on May 17, 2019 at 09:03


Next: Describe the ways of detecting Excess Privileges.
Previous: Outline limitations of quantity theory of money

View More Introduction to ICT Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions