Answer:
Security logs should include detailed timestamps, affected resources, and actions performed to enhance investigation capabilities, providing a comprehensive view of security-related events.
Security logs should include detailed timestamps, affected resources, and actions performed to enhance investigation capabilities, providing a comprehensive view of security-related events.
You may be interested in:
Web Security MCQs