- Reviewing accounting logs: automated audit tools should be used by
appointed security personnel for the system to examine standard system-
provided accounting logs to ascertain whether there is any activity or pattern of
activities that might indicate an electronic attack has occurred.
8.9.12 Reaction to electronic attack on e-Government services should be
provided at this level by:
Email this to a friend.
Previous item —