Carol discusses the actions to review that may indicate your system is under attack or has been breached.
Written by Carol Woodbury
Last month, I discussed the unthinkable—that your IBM i system has been breached. This month, I want to discuss ways that you can look for signs of a breach or an attack, as well as the information you'll want to retain to aid the investigation should a breach occur. Both require that your system be configured properly prior to the breach. Let's take a look.