If a person with malicious intent were to get into your network and have read

If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?

LOOKING FOR HELP WITH YOUR ESSAYS? LET OUR EXPERT WRITERS HELP YOU ACE YOUR PAPER WITH ANY DEADLINE OF YOUR CHOICE. ORDER NOW FOR 15% DISCOUNT