employing patches, deploying firewalls, and implementing other types of security controls.
Similarly, log analysis can help identify the causes of incidents; such knowledge can then be used to modify
existing controls to reduce the risk that a similar attack will succeed in the future.