The Methodology For Detecting And Managing The Abuse Of It Systems

This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to secur...

Full description

Bibliographic Details
Main Authors: Mirosław Ryba, Józef Sulwiński, Aleksander Poniewierski
Format: Article
Language:English
Published: AGH University of Science and Technology Press 2008-01-01
Series:Computer Science
Subjects:
Online Access:http://journals.agh.edu.pl/csci/article/download/193/114