The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?
The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?
An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?