Answer:
Access logs can aid in the identification of insider threats by tracking unusual or unauthorized access patterns by internal users.
Access logs can aid in the identification of insider threats by tracking unusual or unauthorized access patterns by internal users.
You may be interested in:
Web Security MCQs