The analysis of logs and system events will best help validate whether suspicious network activity is malicious, because they provide detailed and timely information about the source, destination, content, and context of the network traffic. Logs and system events can be collected from various sources, such as firewalls, routers, switches, servers, applications, and endpoints, and can be correlated and analyzed using tools such as security information and event management (SIEM) systems. By analyzing logs and system events, an organization can identify anomalies, patterns, trends, and indicators of compromise (IOCs) that may signal malicious network activity, such as unauthorized access, data exfiltration, malware infection, denial-of-service attack, or lateral movement. Logs and system events can also help determine the scope, impact, and root cause of the malicious network activity, and support the incident response and remediation process. References = Risk IT Framework, ISACA, 2022, p. 221
Submit