An engineer is analyzing a recent breach where confidential documents were altered and stolen by the receptionist. Further analysis shows that the threat actor connected an external USB device to bypass security restrictions and steal data. The engineer could not find an external USB device. Which piece of information must an engineer use for attribution in an investigation?
sheyshey
7 months, 3 weeks agoFaio
9 months, 3 weeks agoAhmedAbdalla
9 months, 3 weeks agoSecurityGuy
11 months, 1 week agoslippery31
1 year, 1 month agoc946f3e
1 year, 2 months agoalhamry
1 year, 2 months agodrdecker100
1 year, 5 months agoevaline12
1 year, 6 months ago