Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3008696
Abstract: For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity)…
read more here.
Keywords:
incident response;
investigation;
response model;
integrated incident ... See more keywords