Question: Consider an automated audit log analysis tool (e.g., swatch). Can you propose some rules which could be used to distinguish suspicious activities from normal user
Step by Step Solution
3.50 Rating (163 Votes )
There are 3 Steps involved in it
Normal behavior would generally involve users creating using or deleting files belonging to ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
451-C-S-D-B-O-S (246).docx
120 KBs Word File
