Security is a process that is:
A.
Continuous
B.
Indicative
C.
Examined
D.
Abnormal
Explanation:
Security is a continuous process; as such you must closely monitor your systems on a
regular basis. Log files are usually a good way to find an indication of abnormal
activities. However some care must be exercise as to what will be logged and how the
logs are protected. Having corrupted logs is about as good as not having logs at all.