What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered
seenagape
What step in the process of Intrusion Detection as shown in the exhibit would an e-mail be delivered to the security admin if an attack were presently taking place?