Author Question: Copying a database containing credit card numbers, viewing sensitive data without authorization, and ... (Read 46 times)

karen

  • Hero Member
  • *****
  • Posts: 537
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
 
  What will be an ideal response?

Question 2

An IDS comprises three logical components: analyzers, user interface and _____.
 
  What will be an ideal response?



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

intrusion

Answer to Question 2

sensors



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

Fewer than 10% of babies are born on their exact due dates, 50% are born within 1 week of the due date, and 90% are born within 2 weeks of the date.

Did you know?

The calories found in one piece of cherry cheesecake could light a 60-watt light bulb for 1.5 hours.

Did you know?

This year, an estimated 1.4 million Americans will have a new or recurrent heart attack.

Did you know?

The first war in which wide-scale use of anesthetics occurred was the Civil War, and 80% of all wounds were in the extremities.

For a complete list of videos, visit our video library