Chapter 3 - Malicious Activity Flashcards

Explore how to monitor for and detect host-based, network-based, and application-based attacks and indicators of compromise. Explore logs, email, and other tools and data sources that can be used as a part of your investigation.