Get premium membership and access questions with answers, video lessons as well as revision papers.

Discuss the forms of unauthorized access

      

Discuss the forms of unauthorized access

  

Answers


Francis
a). Eavesdropping:
This is tapping into communication channels to get information, e.g., Hackers mainly use eavesdropping to obtain credit card numbers.

b). Surveillance (monitoring):
This is where a person may monitor all computer activities done by another person or people.
The information gathered may be used for different purposes, e.g., for spreading propaganda or sabotage.

c). Industrial espionage:
Industrial espionage involves spying on a competitor so as to get or steal information that can be used to finish the competitor or for commercial gain.
The main aim of espionage is to get ideas on how to counter by developing similar approach or sabotage.

d). An employee who is not supposed to see some sensitive data gets it, either by mistake or design.

e). Strangers who may stray into the computer room when nobody is using the computers.

f). Forced entry into the computer room through weak access points.

g). Network access in case the computers are networked & connected to the external world.
francis1897 answered the question on March 14, 2023 at 13:02


Next: In your own view, what are some of the intentions of the people who may want to access data without permission?
Previous: What causes errors and accidental access to data and information?

View More Data Security and Control Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions