227k views
22 votes
7.If malicious actors got into your network to access your network security logs, how could they use the packet details to their advantage

1 Answer

6 votes

Network security logs document every aspect of network activity, from emails to logins to firewall updates. As such, hackers can use this information to infiltrate your network or launch email phasing activity by collecting email addresses used to send and receive from your organization.

User KJW
by
5.0k points