- System monitoring: standard system-provided activity monitors should be
regularly examined to ascertain whether there is any suspicious activity or
pattern of activities that might indicate an electronic attack is being conducted. At
this level, consideration should be given to the use of host and/or network based
intrusion detection systems.
Email this to a friend.
Previous item —