In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
There are different types of logs are available
Use of logs by a security professional to analyze security in the network
It is used to deal with internal security and help them to resolve issues, data theft, Access to files and folders, System time adjustment, brut force login attempts by an unauthorized user, reviewing these logs will assist in traceback the hacker and troubleshoot the problem in our network.