August 2019
Intermediate to advanced
342 pages
9h 35m
English
Once the representative events related to suspicious access have accumulated, it is important to understand the management strategy that is intended to be followed.
The more traditional one foresees the configuration of reactive alarm systems; that is, once possible unauthorized access is identified, the alarm system triggers an event (reaction) and the user account is automatically suspended or blocked.
The reactive strategy, although simple to implement, presents the following important side effects and drawbacks:
Read now
Unlock full access