-
IT Security in higher education – spotting the attacker
- April 22, 2018
- Posted by: admin
- Category: IT Security
No CommentsIt’s already a given that spotting an attacker is difficult in IT Security – they use compromised credentials to access any and all data available to that account. This means that the attacker is simply accessing whatever data the user was already given access to. So, how are you supposed to spot inappropriate access when