Logs Analysis and Cyber-Attack Analysis
A log is a comprehensive file that captures activity within the operating system, software applications or devices. Logs automatically document any information designated by the system administrators, including: messages, error reports, file requests, file transfers and sign-in/out requests. The activity is also time stamped, which helps IT professionals and developers establish an audit trail in the event of a system failure, breach or other outlying event.
Purpose
Reviewing computer-generated event logs to proactively identify bugs, cyber-attacks , security threats, factors affecting system or application performance, or other risks. Log analysis can also be used more broadly to ensure compliance with regulations or review user behavior. It is also used to investigate different cyber Attacks exploiting various vulnerabilities.