Mike is a snooping employee who doesn’t wish to be caught. What technique would he use to avoid his snooping detection?
  1. Deletion
  2. Avoidance Deletion
  3. Deterrence Scrubbing
  4. Scrubbing
Explanation
Answer: D - Employees who do not want to be caught snooping would use scrubbing to erase their steps through a system. The scrubbing can cause the administrator to not be alerted or aware of the security breach and can destroy valuable data. Therefore, audit logs should be protected by strict access control. The integrity of the data can be ensured with the use of digital signatures, message digest tools, and strong access controls. Its confidentiality can be protected with encryption and access controls if necessary and it can be stored on write-once media to prevent loss or modification of the data. Unauthorized access attempts to audit logs should be captured and reported.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz