Logging User Events Flashcards
1
Q
What critical events are we looking for when Logged and Monitored? [6]
A
An effective log data collection and analysis process should incorporate tools to collect evidence of critical events like:
- Reconnaissance against systems
- Weaponization
- Delivery
- Installation of malware
- Command and Control
- Action begins
2
Q
What are the benefits of logging and monitoring?
A
Security logging and monitoring can be useful for the detection of security breaches, for event reconstruction, for faster recovery