IDNLearn.com is designed to help you find accurate answers with ease. Find the answers you need quickly and accurately with help from our knowledgeable and experienced experts.
Answer:
Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorized access to a computing system. Describe several different pieces of information in the log that could be combined to identify the impostor. Pfleeger, Charles P.; Pfleeger, Shari Lawrence; Margulies, Jonathan. Security in Computing (p. 230). Pearson Education. Kindle Edition.