Author Question: Copying a database containing credit card numbers, viewing sensitive data without authorization, and ... (Read 52 times)

karen

  • Hero Member
  • *****
  • Posts: 537
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
 
  What will be an ideal response?

Question 2

An IDS comprises three logical components: analyzers, user interface and _____.
 
  What will be an ideal response?



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

intrusion

Answer to Question 2

sensors



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Women are two-thirds more likely than men to develop irritable bowel syndrome. This may be attributable to hormonal changes related to their menstrual cycles.

Did you know?

People about to have surgery must tell their health care providers about all supplements they take.

Did you know?

About 3.2 billion people, nearly half the world population, are at risk for malaria. In 2015, there are about 214 million malaria cases and an estimated 438,000 malaria deaths.

Did you know?

The people with the highest levels of LDL are Mexican American males and non-Hispanic black females.

Did you know?

According to the FDA, adverse drug events harmed or killed approximately 1,200,000 people in the United States in the year 2015.

For a complete list of videos, visit our video library