As security administrator, you must monitor the system on
a regular basis for possible security breaches. Following are the
most common forms of system attacks:
Hunting for access lines
Hunting for passwords
Attempting a break-in
Changing or creating user authorization file (UAF)
records
Granting/stealing extra privileges
Introducing apparently innocent software (Trojan
horse software) that is intended to steal user passwords or do other
damage to the system
Introducing viruses in command procedures and programs
to gain access to privileged accounts