Trusted by millions of Kenyans
Study resources on Kenyaplex

Get ready-made curriculum aligned revision materials

Exam papers, notes, holiday assignments and topical questions – all aligned to the Kenyan curriculum.

Describe the ways of detecting scanning attacks.

Describe the ways of detecting scanning attacks.

Answers


Kavungya
Potential Offenders
- Malicious intruders.
- Spies attempting to access systems for targeted data.
- Criminals intent on committing fraud.
Methods of Detection
- Computer logs that show when telephone calls were received by the computer and when attempts were made.
- Loss of data or transfer of funds or other assets.
- Telephone company records.
Evidence
- Telephone company records (pen register and dialed number recorder (DNR) records).
- Possession of war dialing programs.
- Computer logs.
- Possession of information compromised as a result of scanning, including lists of telephone numbers.
Kavungya answered the question on May 17, 2019 at 09:03

Answer Attachments

Exams With Marking Schemes

Related Questions