A method of responding to targeted attacks based on the mapping of information security events using indication signatures
Authors:
Abstract:
A method of responding to targeted attacks is developed, which is based on the idea of detecting and responding to targeted attacks at the stage of their implementation. The adequacy of application of the developed method in practice is demonstrated.