The Methodology For Detecting And Managing The Abuse Of It Systems
This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to secur...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AGH University of Science and Technology Press
2008-01-01
|
Series: | Computer Science |
Subjects: | |
Online Access: | http://journals.agh.edu.pl/csci/article/download/193/114 |