Question: Consider an automated audit log analysis tool (e.g., swatch). Can you propose some rules which could be used to distinguish suspicious activities from normal user

Consider an automated audit log analysis tool (e.g., swatch). Can you propose some rules which could be used to distinguish “suspicious activities” from normal user behavior on a system for some organization?

Step by Step Solution

3.50 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Normal behavior would generally involve users creating using or deleting files belonging to ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

451-C-S-D-B-O-S (246).docx

120 KBs Word File

Students Have Also Explored These Related Operating System Questions!