Skip to content

Latest commit

 

History

History
4 lines (4 loc) · 311 Bytes

File metadata and controls

4 lines (4 loc) · 311 Bytes

Definition

Being able to determine the attacker or [[Principle]].

  • Audit trails and logs, even in security failure there is a need to detect in order to react, and investigate after is system is re-secured.
  • Secure timestamping (e.g. using OS, or network, attacker may attempt to damage integrity of logs)