- Joined
- Aug 7, 2013
- Messages
- 1,338
Hi,
I know next to nothing about computer / information security, but here is the situation.
At my university we have a library which has computers that anyone, including non-affiliated people, can use. They have no login credentials. Furthermore, the library does not keep logs or check-ins of people who enter or leave the building. There may be security cameras, but I can't see how these could be useful, since a perpetrator could dress up in a way that recognition would be difficult, and furthermore a non-affilate wouldn't have any information in the university database.
So, suppose someone installs some rogue software on some of these machines to do whatever. How could the university find out who did it? Or would this be impossible without very lucky cameras and reports of suspicious people / activity in the area?
I know next to nothing about computer / information security, but here is the situation.
At my university we have a library which has computers that anyone, including non-affiliated people, can use. They have no login credentials. Furthermore, the library does not keep logs or check-ins of people who enter or leave the building. There may be security cameras, but I can't see how these could be useful, since a perpetrator could dress up in a way that recognition would be difficult, and furthermore a non-affilate wouldn't have any information in the university database.
So, suppose someone installs some rogue software on some of these machines to do whatever. How could the university find out who did it? Or would this be impossible without very lucky cameras and reports of suspicious people / activity in the area?