The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider.

How can Jack detect issues like this using his organization's new centralized logging?

a. Deploy and use an IDS
b. Send logs to a central logging server
c. Deploy and use a SIEM
d. Use syslog