What information is available from the firewall, router, server, system, intrusion detection system (IDS), system logs?
– The alarms, scans and scenario is all the information you need. Logs in the instructions is referring to the SIEM alarm. A – Summary B – submit the OSSIM vulnerability report. (attach complete report) as appendix. c – Submit the systems and data compromised and answer the basic assessment questions in the incident response […]