Top Posters
Since Sunday
g
3
2
J
2
p
2
m
2
h
2
s
2
r
2
d
2
l
2
a
2
s
2
New Topic  
lbelcher lbelcher
wrote...
Posts: 482
4 years ago
Hackers engage in a series of activities when breaking into and compromising a computer network or system.  In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:

▸ Covering their tracks

▸ Creating back doors

▸ Initial attack

▸ Information gathering
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 189 times
1 Reply
Replies
Answer verified by a subject expert
vande746vande746
wrote...
Posts: 383
4 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

lbelcher Author
wrote...

4 years ago
Correct Slight Smile TY
wrote...

Yesterday
Good timing, thanks!
wrote...

2 hours ago
I appreciate what you did here, answered it right Smiling Face with Open Mouth
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  723 People Browsing
 122 Signed Up Today
Related Images
  
 1073
  
 9773
  
 222
Your Opinion
What percentage of nature vs. nurture dictates human intelligence?
Votes: 431

Previous poll results: What's your favorite coffee beverage?