-
What is your primary
source of information
when you suffer a
security
breach?
-
Logs
in software: Willing to
see
real-world
examples of good and bad
practices?
-
Can you find out who
runs that funny Grid
job? Can you tell on
which
site,
which
machine
it runs? Which files
were
used on
it? What
files were
created?
All the answers at
iCSC
Lecture 7
|