Completeness of monitoring and recording unauthorized access attempts :: Data protection information systems of enterprises and organizations

Completeness of monitoring and recording unauthorized access attempts

  Completeness of monitoring and recording unauthorized access, ie the need to establish the exact identity of each user and logging his actions for possible investigation, as well as the impossibility of committing to any operation of information processing in IT without its prior registration.

24.07.2014

Sponsors-