As security administrator, you must monitor the system ona regular basis for possible security breaches. Following are themost common forms of system attacks:
Hunting for access lines
Hunting for passwords
Attempting a break-in
Changing or creating user authorization file (UAF)records
Granting/stealing extra privileges
Introducing apparently innocent software (Trojanhorse software) that is intended to steal user passwords or do otherdamage to the system
Introducing viruses in command procedures and programsto gain access to privileged accounts