-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity – Attack and Defense Strategies, 3rd edition
By :

In Chapter 14, Investigating an Incident, you learned about the investigation process, and some techniques for finding the right information while investigating an issue. However, to investigate a security issue, it is often necessary to review multiple logs from different vendors and different devices. Although each vendor might have some custom fields in the log, the reality is that once you learn how to read logs, it becomes easier to switch vendors and just focus on deltas for that vendor. While there are many tools that will automate log aggregation, such as a SIEM solution, there will be scenarios in which you need to manually analyze a log in order to figure out the root cause.
In this chapter, we are going to cover the following topics:
Let’s start...
Change the font size
Change margin width
Change background colour