As security administrator, you must monitor the
system on a regular basis for possible security breaches. Following
are the most common forms of system attacks:
Hunting for access lines
Hunting for passwords
Attempting a break-in
Changing or creating user
authorization file (UAF) records
Granting/stealing extra
privileges
Introducing apparently
innocent software (Trojan horse software) that is intended to steal
user passwords or do other damage to the system
Introducing viruses in
command procedures and programs to gain access to privileged accounts