This is the second part of "Eventtrigers and their danger - victim" video where the attacker point of view is examined. In this case, knowing internal logging policy can be used against the victim by purposely triggering a log event.
This blog is dedicated to methodology development of the scientific approach to computer science education and cybersecurity fields like digital forensics and information assurance. This site is not intended as a reference for practitioners of cybersecurity, but a guidance for those entering this field and would like to learn the basics of the scientific approach and methodological testing of scientific problems that is missing from a basic computer science and technology based STEM education.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment