IP Camera and Mobile Based Remote Login Intrusion Detection

Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action that user was not legally allowed to take, it is called intrusion. Internal intruders have legitimate access through user accounts; external intruders break into a system without benefit of a user account A server is a system which keeps running continuously and the administrator cannot monitor the system all the time.

Provided by: Universal Association of Computer and Electronics Engineers Topic: Security Date Added: May 2012 Format: PDF

Find By Topic