Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance Computer Security Threat Monitoring and Surveillance

csrc.nist.gov
from csrc.nist.gov More from this publisher
15.07.2013 Views

The abnormal patterns of reference are determined simply by dis­ covery of file references that have not been previously encountered. If the files referenced in a particular job are not identical to a set previously seen, this should be reported as a new event. In the section on the organization of a surveillance system, some of these comments are, illustrated with the results of a model system.

The abnormal patterns of reference are determined simply by dis­<br />

covery of file references that have not been previously encountered.<br />

If the files referenced in a particular job are not identical to a<br />

set previously seen, this should be reported as a new event. In the<br />

section on the organization of a surveillance system, some of these<br />

comments are, illustrated with the results of a model system.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!