Author Question: Copying a database containing credit card numbers, viewing sensitive data without authorization, and ... (Read 54 times)

karen

  • Hero Member
  • *****
  • Posts: 537
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
 
  What will be an ideal response?

Question 2

An IDS comprises three logical components: analyzers, user interface and _____.
 
  What will be an ideal response?



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

intrusion

Answer to Question 2

sensors



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The people with the highest levels of LDL are Mexican American males and non-Hispanic black females.

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

Cyanide works by making the human body unable to use oxygen.

Did you know?

Nitroglycerin is used to alleviate various heart-related conditions, and it is also the chief component of dynamite (but mixed in a solid clay base to stabilize it).

Did you know?

Drug-induced pharmacodynamic effects manifested in older adults include drug-induced renal toxicity, which can be a major factor when these adults are experiencing other kidney problems.

For a complete list of videos, visit our video library