Get premium membership and access questions with answers, video lessons as well as revision papers.
This is a situation where users in a system have excess privileges--more privileges than they ought to have. If a cracker breaks into one user's account, he can compromise and damage that user's files, but he can't ordinarily get beyond the boundaries of the user's account to damage the rest of the system.
An ordinary user on an ordinary system doesn't need to be able to modify all of the files on that system. And yet, in many systems, a user has the system privileges that entitle him to do just that. The user may never actually want to change anyone else's files--he may not even know that he is allowed to--but nevertheless the privileges are there. If an intruder gets access to the system through the user's account, he can exploit this weakness.
Kavungya answered the question on May 17, 2019 at 09:13
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trap Doors.(Solved)
Describe the ways of detecting Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Software Piracy.(Solved)
Describe the ways of detecting Software Piracy.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Masquerading.(Solved)
Describe the ways of detecting Masquerading.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Wiretapping and Eavesdropping.(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted: May 17, 2019. Answers (1)
- Describe Dumpster Diving.(Solved)
Describe Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- Explain the measures to fight unethical use of ICT.(Solved)
Explain the measures to fight unethical use of ICT.
Date posted: May 17, 2019. Answers (1)
- Describe the data protection act.(Solved)
Describe the data protection act.
Date posted: May 17, 2019. Answers (1)
- State the sources of ICT legislation.(Solved)
State the sources of ICT legislation.
Date posted: May 17, 2019. Answers (1)
- Outline the types of workplace conflicts.(Solved)
Outline the types of workplace conflicts.
Date posted: May 17, 2019. Answers (1)
- Give the effects of conflicts in organizations.(Solved)
Give the effects of conflicts in organizations.
Date posted: May 17, 2019. Answers (1)