A retail platform in Austin, Texas reports repeated bot traffic and injection attempts detected at its software-based gateway. As the incident team begins evidence collection, which step in the web-attack investigation methodology explicitly directs them to include output from that gateway as a primary evidence source?
Submit