Authorized users exceeding their authority
Persons who have defeated the physical access controls of a facility
Employees gaining access to controlled areas
Users who access unintended areas of the network
Its primary effect is to consume system resources.
It may or may not carry a malicious payload.
It spreads through user action.
It attaches itself to executable code.
A physical control
A logical control
A compensating control
An administrative control
Reduced total cost of ownership of desktops
Standardized access control
Easier training for users
Wider availability of applications
Successful access attempts
System performance measurements
Failed access attempts
Changes to user permissions
Modification may impede an investigation
An attacker may try to alter them.
They may contain confidential information.
Standard format is critical for automated processing.
Setting a higher clipping level
Locking out a user for a set time period
Establishing a lockout that requires administrator intervention
Using a stronger cryptographic algorithm