This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


  • Reviewing accounting logs: automated audit tools should be used by appointed security personnel for the system to examine standard system-
    provided accounting logs to ascertain whether there is any activity or pattern of activities that might indicate an electronic attack has occurred. 8.9.12 Reaction to electronic attack on e-Government services should be provided at this level by:

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site