Latest Hacking,Hacker News for Hackers and Hacking and Secuirty Community

Latest Hacking News for Hacker News for Security Guys

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up. What is the most likely cause?

1 min read

Proper chain of custody was not observed while collecting the logs.

The attacker altered or erased events from the logs.

The network devices are not all synchronized.

The security breach was a false positive.

Leave a Reply

Your email address will not be published. Required fields are marked *