An artifact observed in a network or a system that constitutes forensic evidence of potential intrusion. Examples include, but are not limited to, malware signatures, IP addresses, and urls of botnet command-and-control systems.
An artifact observed in a network or a system that constitutes forensic evidence of potential intrusion. Examples include, but are not limited to, malware signatures, IP addresses, and urls of botnet command-and-control systems.