You run a website in an IaaS environment. You wake up to discover that your website has been defaced. Assume you are running a web server and an FTP server in this environment and that both an application proxy and a firewall sit between those servers and the Internet. All of your VMs are running SSH servers. What logs might help you determine how the website was defaced? What kind of information

would you look for?

What will be an ideal response?

Some
possible
logs
to
look
at
and
the
SSH
connection
logs,
FTP
logs,
application
proxy
logs,
firewall
logs,
and
server
security
event
logs.
Look
for
logins,
connections
from
unknown
IP
addresses,
file
uploads,
and
changes
to
files.

Computer Science & Information Technology

You might also like to view...

When properly arranged, an Excel worksheet can be used as a data source in a Word mail merge

Indicate whether the statement is true or false

Computer Science & Information Technology

The group scope that can include users, computers, and other global groups from the same domain is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology