Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
I<br />
TASKS<br />
i· r<br />
! '<br />
:1. Desig!n contents of:<br />
a)! User-id Trace Report<br />
! . .<br />
b) Job-id Trace Report<br />
' '<br />
cr Oevice-id Trace Report<br />
'2. Design Trace Program<br />
3. Code <strong>and</strong> Test Trace Program<br />
SUMMARY TASK; SCHEDULE FOR .<br />
I I I .<br />
I<br />
I<br />
SECURITY TRACE SUBSYSTEM . I<br />
1 2: 3 415 6<br />
i i<br />
I .<br />
l<br />
•<br />
I i <br />
I ' I I<br />
I I<br />
I I<br />
I<br />
I I I<br />
I<br />
! i<br />
I<br />
I<br />
I<br />
I<br />
I<br />
I<br />
I I