The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
Sensing and analyzing system events for the purpose of noticing (i.e., becoming aware of) attempts to access system resources in an unauthorized manner. (See: anomaly detection, IDS, misuse detection. Compare: extrusion detection.) [IDSAN, IDSSC, IDSSE, IDSSY]
Usage: This includes the following subtypes: