Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance Computer Security Threat Monitoring and Surveillance
as a function of the details of the type of audit trails being taken and the kind of monitoring that one attempts to perform on the specific objects.
- Page 1: James P. Anderson Co. Box 42 Fort W
- Page 10 and 11: FIGURE 2 · Threat Representations
- Page 12 and 13: In most systems such data is not co
- Page 14: is interesting in that it is by def
- Page 21 and 22: This is well illustrated by the exa
- Page 24 and 25: If (for purposes of illustration) w
- Page 27: The abnormal patterns of reference
- Page 30: and so forth. The purpose of the so
- Page 33: Job/User Identification Program Sor
- Page 43: Inclusion of the actual standard de
- Page 52 and 53: 6.4 Trace Subsystem Functional Desc
- Page 54: I TASKS i· r ! ' :1. Desig!n conte
as a function of the details of the type of audit trails being<br />
taken <strong>and</strong> the kind of monitoring that one attempts to perform<br />
on the specific objects.