Top Posters
Since Sunday
22
22
19
18
18
17
17
16
16
16
16
16
New Topic  
wrote...
Posts: 206
A week ago
Hackers engage in a series of activities when breaking into and compromising a computer network or system.  In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:

▸ Covering their tracks

▸ Creating back doors

▸ Initial attack

▸ Information gathering
Textbook 
Introduction to Security: Operations and Management
Edition: 5th
Authors:
Read 85 times
1 Reply
Replies
Answer verified by a subject expert
wrote...
Posts: 229
Rep: 8 0
A week ago
Sign in or Sign up in seconds to unlock everything.
Covering their tracks
1
Related Topics
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers.
Learn More
Improve Grades
Help Others
Save Time
Accessible 24/7
  119 People Browsing
Your Opinion
Which 'study break' activity do you find most distracting?
Votes: 159

Related Images
 3517
 149
 97