Author Question: Copying a database containing credit card numbers, viewing sensitive data without authorization, and ... (Read 58 times)

karen

  • Hero Member
  • *****
  • Posts: 537
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
 
  What will be an ideal response?

Question 2

An IDS comprises three logical components: analyzers, user interface and _____.
 
  What will be an ideal response?



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

intrusion

Answer to Question 2

sensors



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Calcitonin is a naturally occurring hormone. In women who are at least 5 years beyond menopause, it slows bone loss and increases spinal bone density.

Did you know?

The cure for trichomoniasis is easy as long as the patient does not drink alcoholic beverages for 24 hours. Just a single dose of medication is needed to rid the body of the disease. However, without proper precautions, an individual may contract the disease repeatedly. In fact, most people develop trichomoniasis again within three months of their last treatment.

Did you know?

Cucumber slices relieve headaches by tightening blood vessels, reducing blood flow to the area, and relieving pressure.

Did you know?

If you use artificial sweeteners, such as cyclamates, your eyes may be more sensitive to light. Other factors that will make your eyes more sensitive to light include use of antibiotics, oral contraceptives, hypertension medications, diuretics, and antidiabetic medications.

Did you know?

The eye muscles are the most active muscles in the whole body. The external muscles that move the eyes are the strongest muscles in the human body for the job they have to do. They are 100 times more powerful than they need to be.

For a complete list of videos, visit our video library