Question

Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.

Answer

This answer is hidden. It contains 5 characters.