Author Question: Copying a database containing credit card numbers, viewing sensitive data without authorization, and ... (Read 55 times)

karen

  • Hero Member
  • *****
  • Posts: 537
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
 
  What will be an ideal response?

Question 2

An IDS comprises three logical components: analyzers, user interface and _____.
 
  What will be an ideal response?



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

intrusion

Answer to Question 2

sensors



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The ratio of hydrogen atoms to oxygen in water (H2O) is 2:1.

Did you know?

Approximately 500,000 babies are born each year in the United States to teenage mothers.

Did you know?

Approximately one in three babies in the United States is now delivered by cesarean section. The number of cesarean sections in the United States has risen 46% since 1996.

Did you know?

Aspirin is the most widely used drug in the world. It has even been recognized as such by the Guinness Book of World Records.

Did you know?

HIV testing reach is still limited. An estimated 40% of people with HIV (more than 14 million) remain undiagnosed and do not know their infection status.

For a complete list of videos, visit our video library