This section is from the book "Computer Security Threat Monitoring And Surveillance", by James P. Anderson.
This section outlines a development plan and gives an estimated schedule and-level of effort to provide an operationally useful security surveillance system. No serious attempt has been made to estimate computer time or storage cost as this will be affected by the actual system configuration used to implement the design.
The basic system consists of two programs:
1. Security Surveillance Subsystem
2. Security Trace Subsystem