 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
Unauthorized
Access and Use
|
|
|
|
|
How
can companies protect against hackers?
|
|
|
|
|
 |
 |
 |
 |
 |
 |
|
Intrusion detection software
|
|
|
|
analyzes network traffic, assesses
|
|
system vulnerabilities, and identifies
|
|
intrusions and suspicious behavior
|
|
|
|
|
|
 |
 |
 |
 |
Access control defines who
|
|
can
access computer and
|
|
|
what actions they can take
|
|
|
|
|
|
|
|
 |
 |
Audit trail records access
|
|
attempts
|
|
|
|
|
|
 |
|
|
|
 |
|
|
|
 |
|
|
|
|