"Why Hackers Love Logs"
"Why Hackers Love Logs"
Computer log tampering is almost always part of a system compromise. Computer log files record application actions. They help identify system issues like design malfunctions and malicious activity. However, their value is often overlooked. They are usually read/write text files with little security and are not considered the company's "crown jewels" to protect. This is a mistake because the logs contain a record of the Information Technology (IT) infrastructure and its use.