Unauthorized Access and Use
How can companies protect against hackers?
p. 576
Next
Click to view Web Link,
click Chapter 11, Click Web Link
from left navigation,
then click Intrusion Detection Software below Chapter 11
Intrusion detection software
analyzes network traffic, assesses
system vulnerabilities, and identifies
intrusions and suspicious behavior
Access control defines who
can access computer and
what actions they can take
Audit trail records access attempts