Passwords - Attacks via Audit Trail

From
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.

This attack was possible on early unix systems, where all log files were readable for anyone.


Back (Attacks on Password Storage) | Table of Contents | Next (One-Way Encryption)