Unauthorized Access and Use
How can companies protect against hackers?
Intrusion detection software
analyzes network traffic, assesses
system vulnerabilities, and identifies
intrusions and suspicious behavior
Access control defines who
can access computer and
what actions they can take
Audit trail records access
attempts