Poisson processes for identity systems and cyber security Last updated on Jan 1, 0001 Poisson processes for identity systems and cyber-security