Process and file system analysis is a labor-intensive and time-consuming task. Although there is a significant chance of receiving several false positives, abnormal resource use is simpler to spot and can be used to prioritise situations for examination. This is why cpu, memory, and disk space consumption iocs used to identify incidents
A digital forensics artefact known as an Indicator of Compromise (IOC) indicates that a network or endpoint may have been compromised. These digital hints assist information security professionals in identifying illegal conduct or security threats, such as data breaches, insider threats, or malware attacks, similar to how physical evidence aids in the identification of criminal activity.
Investigators can compile signs of compromise either manually after spotting suspicious activity or automatically as part of the organization's cybersecurity monitoring capabilities. This data can be used to develop "smarter" tools that can recognize and quarantine questionable files in the future, as well as to mitigate an ongoing attack or address a security event that has already occurred.
To learn more about IOC's here,
https://brainly.com/question/19818244
#SPJ4