> LOGICAL ACCESS CONTROLS VIOLATORS
-In information technology, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability in computer information systems.
- Logical access is often needed for remote access of hardware and is often contrasted with the term "physical access," which refers to interactions (such as a lock and key) with hardware in the physical environment, where equipment is stored and used.
-Logical access controls enforce access control measures for systems, programs, processes, and information. The controls can be embedded within operating systems, applications, add-on security packages, or database and telecommunication management systems.
**LOGICAL ACCESS CONTROLS VIOLATORS**
-- IS Personnel
-- End users
-- Former employees
-- Interested or educated outsiders
-- Competitors & crackers
-- Part-time & temporary personnel