answersLogoWhite

0

It depends what the person does ! They could do something as smple as printing out a few pages of information for use by a competitor - to planting a virus that destroys everything stored on the hard-drive.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

Proctor when talking about computers?

A clever or expert programmer who can gain unauthorized access to other computers


An unauthorized person manages to access the computers in the hospital where you work and downloads information Who is the most likely person to handle the disaster?

Security officer


People who gain unauthorized access to computers for the purpose of doing damage are called?

People that attempt to gain unauthorized access to a computer or called crackers. There is a difference between a cracker and a hacker and the terms are often mistaken or used interchangeably. A cracker is one who is trying to cause harm or gain unauthorized information. A hacker is some one that attempts to break into computers and software for the purpose of fixing or discovering security holes to prevent crackers from getting in.


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act


What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


Is unauthorized person is not allowed a correct?

Yes, an unauthorized person is not allowed to access certain areas or information. Unauthorized access can pose security risks and violate privacy policies. It is important to secure access controls to prevent unauthorized individuals from gaining entry.


What is firewall is and why it is necessary?

A firewall is a device made to either allow or deny transmissions from other computers (particularly from the Internet) to protect the computer from unauthorized access. A firewall is necessary because, as was said, it blocks unauthorized access by hackers and disallows any files that may contain harmful data like viruses and malware.


In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so. I understand what you mean, and the answer to that is FALSE.


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to?

breach


What is the actual or possible loss of possible control unauthorized disclosure or unauthorized access to pii?

breach


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to PII?

Breach


What is prevent the unauthorized network access?

firewall

Trending Questions
What is the device that authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer? What is a box called where you decide what action a computer should take? Who makes a good CD burner for laptop computers? Is a text based approach to documenting an algorithm? List and briefly explain the services provided by the network layer of the Internet on the scope of transport layer protocol? What online store sells inexpensive computer parts? Is the ability of two or more systems or components to exchange information and to use the information that has been exchanged? Why is it important for the firm to make backups of the data that you use regularly? What affects did the umbrella have on people's lives? What is the service code for a canon ipf605? In Kaiba Corp Virtual Duel System it keeps teling me I cant connect help? What is the thing in front of a mic in a studio? What if there is no RAM in a computer? What is computer primary keys? What are the advantages of hardwired control unit? How do you get to the secret store in nicktropolis? What is the best virtual game? When you start MSN after a while your computer freezes to a point where even ctrl alt del doesn't work tried reinstalling my system to figure out if it may be another program but that's not it help? What is the RAL code for Munsell 2.5y9.4? The computer fraud and the abuse act was passed in the 1986 to combat?