1. Context
1.1 Issues
Attacks on information systems and networks have been on the increase for many years. This growth has gone hand in hand with an ever-increasing number of published computer vulnerabilities, most of them software flaws. These vulnerabilities are the subject of official or semi-official publications, often accompanied by programs enabling all or part of an attack to be carried out automatically.
SCROLL TO TOP1.1.1 Difficulty in implementing preventive measures
At the same time, preventive measures...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Context
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
- (1) - WOOD (M.), ERLINGER (M.) - Intrusion Detection Message Exchange Requirements. - IETF (22 oct. 2002). http://www.ietf.org/internet-drafts/draft-ietf-idwg-requirements-10.txt
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!