71,600 views
5 votes
5 votes
7.If malicious actors got into your network to access your network security logs, how could they use the packet details to their advantage

User Ricardo Fercher
by
2.5k points

1 Answer

26 votes
26 votes

Network security logs document every aspect of network activity, from emails to logins to firewall updates. As such, hackers can use this information to infiltrate your network or launch email phasing activity by collecting email addresses used to send and receive from your organization.

User Anakin Skywalker
by
2.7k points