Responsible Analytics and Data Mining in Education 2018
DOI: 10.4324/9780203728703-19
|View full text |Cite
|
Sign up to set email alerts
|

Contingency Planning for Data Breaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…But without an agile-based log management, much of this data can not be utilized. Logging and log analysis requires substantial amounts of operational time to properly develop analysis rules, criteria and alerts to enable protection (Roberts, 2018;Stevens and Wirth, 2018). The exponential rate of growth of data over the last few years has led to the coinage of novel terminology, "big data."…”
Section: The Complexity Of Cyber Datamentioning
confidence: 99%
“…But without an agile-based log management, much of this data can not be utilized. Logging and log analysis requires substantial amounts of operational time to properly develop analysis rules, criteria and alerts to enable protection (Roberts, 2018;Stevens and Wirth, 2018). The exponential rate of growth of data over the last few years has led to the coinage of novel terminology, "big data."…”
Section: The Complexity Of Cyber Datamentioning
confidence: 99%