| http://www.w3.org/ns/prov#value | - Record audit trails about the intruder Delay the intruder Disconnect the intruder Monitor the intruder's actions C ??? ??? ??? After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take?
|