A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment

The last security incident of this week occurred on Friday morning. The security adminis- trator received an alert from the intrusion detection system (IDS) in the Boston office that indicated suspicious activity originating from that office directed at the company main- frame system. The workstation IP address was available in the IDS logs. The security administrator reviewed the access logs from the mainframe and confirmed that the suspi- cious activity reported by the IDS needed to be reported to the Vice President of Informa- tion Security. The Challenge The security administrator needed to identify which user was associated with the IP ad- dress at the time of.

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
24    19    1    27-11-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.