answersLogoWhite

0

It depends what the person does ! They could do something as smple as printing out a few pages of information for use by a competitor - to planting a virus that destroys everything stored on the hard-drive.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

Proctor when talking about computers?

A clever or expert programmer who can gain unauthorized access to other computers


An unauthorized person manages to access the computers in the hospital where you work and downloads information Who is the most likely person to handle the disaster?

Security officer


People who gain unauthorized access to computers for the purpose of doing damage are called?

People that attempt to gain unauthorized access to a computer or called crackers. There is a difference between a cracker and a hacker and the terms are often mistaken or used interchangeably. A cracker is one who is trying to cause harm or gain unauthorized information. A hacker is some one that attempts to break into computers and software for the purpose of fixing or discovering security holes to prevent crackers from getting in.


What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act


Is unauthorized person is not allowed a correct?

Yes, an unauthorized person is not allowed to access certain areas or information. Unauthorized access can pose security risks and violate privacy policies. It is important to secure access controls to prevent unauthorized individuals from gaining entry.


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to?

breach


What is firewall is and why it is necessary?

A firewall is a device made to either allow or deny transmissions from other computers (particularly from the Internet) to protect the computer from unauthorized access. A firewall is necessary because, as was said, it blocks unauthorized access by hackers and disallows any files that may contain harmful data like viruses and malware.


In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so. I understand what you mean, and the answer to that is FALSE.


What is prevent the unauthorized network access?

firewall


What is the actual or possible loss of possible control unauthorized disclosure or unauthorized access to pii?

breach


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to PII?

Breach