
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>Extensive logging of events is regularly done by security devices such as firewalls and routers. Significant time is spent reviewing these logs to determine if systems are under attack, and funds are spent in purchasing event correlation software to readily combine the output of separate sources in the hope of detecting attacks missed by the separate reviewing of individual logs. In addition, intrusion detection systems are put in place to alert of intrusions, and results from such systems are both individually reviewed and coordinated with other information. Detecting the occurrence of incidents is clearly of great importance to enterprises. Little attention, though, has been paid to the ways to properly respond to incidents of an actually or even potentially damaging nature. This writing discusses what is involved in proper incident response.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 12 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
