Oops, that's not right...

By conducting a public survey is incorrect.
Explanation :
Utilizing security tools for log analysis helps pinpoint the breach's source, crucial for taking corrective actions.