know that it happened and it goes unseen unless you have software to catch such an act. Of course there are some acts of unauthorized access like viruses that are common and come from emails, attachments, downloads applications, and come mainly from PC users not knowing what is legit or not. The types of unauthorized access that are discussed in this paper are Hardware, network, software, freedom in the IT world, web/data mining, and hacking. From a hardware standpoint unauthorized access can come…
Words 3103 - Pages 13