____ systems are highly useful for both law enforcement and for law breaking, for example, by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.
A) Access control
B) Biometric
C) Keystroke logging
D) Intrusion detection
Answer: C