Demystifying Threats of Privilege Users
Abstract
As the IT infrastructure is becoming increasingly sophisticated and size of the application and system proliferating each day, one of the most fundamental problems the IT Security team today is to manage and monitor the threats of privilege users accounts.
Downloads
Download data is not yet available.
Published
2019-05-24
How to Cite
Sunil Nadkarni. (2019). Demystifying Threats of Privilege Users. CYBERNOMICS, 1(1), 26-27. Retrieved from https://cybernomics.in/index.php/cnm/article/view/14
Section
Scrutiny Tip
Copyright (c) 2019 CYBERNOMICS
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.