Problem
Fundamentals of Infrastructure Security SEC 290
Use your favorite search engine to look for a recent cybersecurity attack. Explain the indicators of compromise that led to the detection of the security attack.
What detection options did you learn about that you would use to effectively detect and prevent that security attack? Justify your answer.