Questions
  • What is your primary source of information when you suffer a security breach?

  • Logs in software: Willing to see real-world examples of good and bad practices?

  • Can you find out who runs that funny Grid job? Can you tell on which site, which machine  it runs? Which files were used on it? What files were created?

All the answers at iCSC Lecture 7