10 http://www.beckershospitalreview.com/healthcare-information-technology/dch-regional-medical-center-employee-
allegedly-stole-data-from-computers.html
Case in Point: Invisible Attacker
In 2014, an employee of a regional medical center in Alabama was accused
of unauthorized access and tampering with data from a data clearing
house
10
. In cases like this, log files may be used for incident response as
well as forensic evidence. In addition, the logging and monitoring services
should limit the window of time attackers have to compromise a system.