|
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
“... is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged...”- 1
- 2