Description
“Intrusion Detection Policy” provides two important functions in protecting information resources:
- Feedback: information as to the effectiveness of other components of the security system. If a robust and effective intrusion detection system is in place, the lack of detected intrusions is an indication that other defenses are working.
- Trigger: a mechanism that determines when to activate planned responses to an intrusion incident.
Reviews
There are no reviews yet.