A network security specialist at a tech firm is investigating an atypical spike in alerts from their security information and event management (SIEM) system. To comprehensively analyze these irregularities, which data source should the specialist prioritize?
a) Firewall logs
b) User authentication logs
c) Network traffic logs
d) Intrusion detection system logs