Get premium membership and access questions with answers, video lessons as well as revision papers.

Describe the ways of detecting scanning attacks.

      

Describe the ways of detecting scanning attacks.

  

Answers


Kavungya
Potential Offenders
- Malicious intruders.
- Spies attempting to access systems for targeted data.
- Criminals intent on committing fraud.
Methods of Detection
- Computer logs that show when telephone calls were received by the computer and when attempts were made.
- Loss of data or transfer of funds or other assets.
- Telephone company records.
Evidence
- Telephone company records (pen register and dialed number recorder (DNR) records).
- Possession of war dialing programs.
- Computer logs.
- Possession of information compromised as a result of scanning, including lists of telephone numbers.
Kavungya answered the question on May 17, 2019 at 09:03


Next: Describe the ways of detecting Excess Privileges.
Previous: Outline limitations of quantity theory of money

View More Introduction to ICT Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions