If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?

Leave a Reply

Your email address will not be published. Required fields are marked *