Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Figure 2 shows the number of logons per hour for two different<br />
days .(approximately 20 days apart) for a number of different users.<br />
Users I, II, <strong>and</strong> rv exhibit consistent patterns of logon, while<br />
users III <strong>and</strong> V exhibit more variability (in these two samples) •<br />
. '<br />
•,