Guide to Computer Security Log Management

Guide to Computer Security Log Management
Author :
Publisher :
Total Pages : 72
Release :
ISBN-10 : 1422312917
ISBN-13 : 9781422312919
Rating : 4/5 (919 Downloads)

Book Synopsis Guide to Computer Security Log Management by : Karen Kent

Download or read book Guide to Computer Security Log Management written by Karen Kent and published by . This book was released on 2007-08-01 with total page 72 pages. Available in PDF, EPUB and Kindle. Book excerpt: A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.


Guide to Computer Security Log Management Related Books

Guide to Computer Security Log Management
Language: en
Pages: 72
Authors: Karen Kent
Categories:
Type: BOOK - Published: 2007-08-01 - Publisher:

GET EBOOK

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). Thes
NIST SP 800-92 Guide to Computer Security Log Management
Language: en
Pages: 80
Authors: National Institute National Institute of Standards and Technology
Categories:
Type: BOOK - Published: 2006-09-29 - Publisher:

GET EBOOK

NISP SP 800-92 September 2006 A log is a record of the events occurring within an organization's systems and networks. Logs are composed of log entries; each en
Guide to Protecting the Confidentiality of Personally Identifiable Information
Language: en
Pages: 59
Authors: Erika McCallister
Categories: Computers
Type: BOOK - Published: 2010-09 - Publisher: DIANE Publishing

GET EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few yea
Technical Guide to Information Security Testing and Assessment
Language: en
Pages: 80
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-05 - Publisher: DIANE Publishing

GET EBOOK

An info. security assessment (ISA) is the process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, person) meets
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Language: en
Pages: 127
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-08 - Publisher: DIANE Publishing

GET EBOOK

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a s