Map
Index
Random
Help
th

Quote: an attacker can bypass the auditing capabilities of a security system by erasing evidence

topics > all references > references i-l > QuoteRef: kargPA12_2002 , p. 122



Topic:
security leaks and weaknesses
Topic:
security by audit trail

Quotation Skeleton

Section 3.4.4 showed how a professional attacker could … [of MULTICS] while installing malicious software. … Unfortunately, many of the intrusion detection systems (IDSs) … in and erasing the evidence before it can …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (56 items)
Topic: security by audit trail (13 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.