O'Reilly logo
  • Leroy Lomg thinks this is interesting:

Assuming a working IDS is in place, which of the following groups is BEST capable of stealing sensitive information due to the absence of system auditing?

  1. Malicious software (malware)
  2. Hacker or cracker
  3. Disgruntled employee
  4. Auditors