Problem
Describe how someone would determine whether an intruder is still logged on or not, and whether the intruder has installed any worm for sending the data out of the system. How would someone overcome these challenges in regards to cyber security?