First page Back Continue Last page Overview Graphics
Intrusion Detection
Trusted systems should be capable of detecting intrusion.
Capable of alerting and obtaining response to detected intrusion.
Provide forensic evidence that results from an intrusion.
Notes: