Home

Finding a Mole: Cyber Counter Intelligence – Part I

Publicado el 05/07/2012 por 

Using proximity card logs, IP logs, and an employee ID list as datasources, we identify suspicious data transmissions and attribute them to a probable suspect.

Also: Frequency

Anuncios