A chronological set of logs and records used to provide evidence of a system's performance or personnel activity that took place on the system and used to detect and identify intruders.
This website uses cookies. By continuing, you agree to our use of cookies unless you've already taken steps to opt-out. For more information, click on our Privacy Policy.