grappling hook program
main program
both (a) and (b)
none of these
determine how and when the problem occurred
what amount of damage was done
when security has been violated
all of these
one program
two programs
three programs
simply records the time
user
type of all access to an object
threat monitoring
audit log
could be included in a compiler
pose a difficult problem because, to detect them
the system can check for suspicious patterns of activity in an attempt to detect a security violation
a time sharing a system that counts the number of incorrect passwords given
A code segment that misuses its file is called Trojan horse
good for file accessing
preventation
practice of safe computing
purchasing unopened software from vendors
avoiding free or pirated copies from public sources
trap doors
Trojan Horse