Guide to Computer Security Log Management

Guide to Computer Security Log Management
Author :
Publisher :
Total Pages : 72
Release :
ISBN-10 : 1422312917
ISBN-13 : 9781422312919
Rating : 4/5 (17 Downloads)

Book Synopsis Guide to Computer Security Log Management by : Karen Kent

Download or read book Guide to Computer Security Log Management written by Karen Kent and published by . This book was released on 2007-08-01 with total page 72 pages. Available in PDF, EPUB and Kindle. Book excerpt: A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.


Guide to Computer Security Log Management Related Books

Guide to Computer Security Log Management
Language: en
Pages: 72
Authors: Karen Kent
Categories:
Type: BOOK - Published: 2007-08-01 - Publisher:

DOWNLOAD EBOOK

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). Thes
Guide to Protecting the Confidentiality of Personally Identifiable Information
Language: en
Pages: 59
Authors: Erika McCallister
Categories: Computers
Type: BOOK - Published: 2010-09 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few yea
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Language: en
Pages: 127
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-08 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a s
Guide to Industrial Control Systems (ICS) Security
Language: en
Pages: 0
Authors: Keith Stouffer
Categories: Computer networks
Type: BOOK - Published: 2015 - Publisher:

DOWNLOAD EBOOK

Guide to Security for Full Virtualization Technologies
Language: en
Pages: 35
Authors: K. A. Scarfone
Categories:
Type: BOOK - Published: 2011 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to pro