Question

A successful attack was performed on a system at time t that gave the attacker full...

A successful attack was performed on a system at time t that gave the attacker full control of the system (including the power to modify the audit log from time t and beyond, but not before time t.) Given the log from time 0 to current such that 0 < t < current, would you still be able to identify that an attack happened on the system? Explain your answer. (Assume that all relevant events are logged in the audit log.)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Yes, we can clearly make out if an attack was made on the system, if the logs were also maintained on a remote log server. Then all we had to do, was verify the local log with remote log. If any changes are found, it implies that an attack was made on the local system and the attacker tried to hamper with the audit logs of the local system.

Add a comment
Know the answer?
Add Answer to:
A successful attack was performed on a system at time t that gave the attacker full...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In power system operations, to simplify real-time computations, approximations are made One example is DC state estimat...

    In power system operations, to simplify real-time computations, approximations are made One example is DC state estimation (SE). In DC SE, an m x 1 measurement vector z can be written as follows: z Hxe where H is the m xn system Jacobian matrix; x is the n x 1 state vector; e is an m x 1 vector of errors in measurements, assumed to be independent of x and H, and the ith entry of e is Gaussian distributed...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • Lewis Securities Inc. has decided to acquire a new market data and quotation system for its...

    Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by the firm’s brokers. The system also permits customers to call up current quotes on terminals in the lobby. The equipment costs $1,000,000 and, if it were purchased, Lewis could obtain a...

  • DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program...

    DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...

  • Lewis Securities Inc. has decided to acquire a new market data and quotation system for its...

    Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by the firm’s brokers. The system also permits customers to call up current quotes on terminals in the lobby. The equipment costs $1,000,000 and, if it were purchased, Lewis could obtain a...

  • Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The sy...

    Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by the firm’s brokers. The system also permits customers to call up current quotes on terminals in the lobby. The equipment costs $1,000,000 and, if it were purchased, Lewis could obtain a...

  • Lewis Securities Inc. has decided to acquire a new market data and quotation system for its...

    Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by the firm’s brokers. The system also permits customers to call up current quotes on terminals in the lobby. The equipment costs $1,000,000 and, if it were purchased, Lewis could obtain a...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • CAN YOU PLEASE SHOW THE EXCEL WORK for the PVs? Thank you FINANCIAL MANAGEMENT Lewis Securities...

    CAN YOU PLEASE SHOW THE EXCEL WORK for the PVs? Thank you FINANCIAL MANAGEMENT Lewis Securities Inc. has decided to acquire a new market data and quotation system for its Richmond home office. The system receives current market prices and other information from several online data services and then either displays the information on a screen or stores it for later retrieval by the firm’s brokers. The system also permits customers to call up current quotes on terminals in the...

  • 13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for...

    13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for the update the general ledger process at AB Hi-Fi. update general ledger process at AB Hi-Fi. the update the general ledger process is, and how comprehensive the current internal (b) Determine how many of the common controls described in table 13.3 are present in the (c) Prepare a short report...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT