Know Your Enemy: II

Cyber Chief Magazine brings you the tactics to uncover and neutralize the insider threat

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap.

Read the paper in HTML format here.