DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSTEM

DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSTEM CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer […]

Continue Reading