15.07.2013 Views

Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2 shows the number of logons per hour for two different<br />

days .(approximately 20 days apart) for a number of different users.<br />

Users I, II, <strong>and</strong> rv exhibit consistent patterns of logon, while<br />

users III <strong>and</strong> V exhibit more variability (in these two samples) •<br />

. '<br />

•,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!