Security log

Security log

A security log is used to track security-related information on a computer system. Examples include:
* Windows Security Log
* Internet Connection Firewall security logAccording to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special software." [Stefan Axelsson, [http://www.securiteinfo.com/ebooks/pdf/unix-sec-log.pdf An Approach to UNIX Security Logging] .]

See also

*Data logging
*Audit trail
*Server log
*Log management and intelligence
*Web log analysis software
*Web counter
*Data logging
*Common Log Format
*Syslog

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Security Log —   [engl.], Sicherheitsprotokoll …   Universal-Lexikon

  • security log —    In Microsoft Windows 2000, a system log that records changes to security settings and audited access such as attempts to open files or folders. You can use the Event Viewer to look at the contents of the security log.    See also application… …   Dictionary of networking

  • Windows Security Log — The Security Log, in Microsoft Windows, is a log that contains records of login/logout activity and/or other security related events specified by the system s audit policy. Auditing allows administrators to configure Windows to record operating… …   Wikipedia

  • Log management and intelligence — Log Management (LM) comprises an approach to dealing with large volumes of computer generated log messages (also known as audit records, audit trails, event logs, etc). LM covers log collection, centralized aggregation, long term retention and… …   Wikipedia

  • Log analysis — (or system and network log analysis ) is an art and science seeking to make sense out of computer generated records (also called log or audit trail records). The process of creating such records is called data logging.Typical reasons why people… …   Wikipedia

  • Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… …   Wikipedia

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz …   Deutsch Wikipedia

  • Security Information Management — (SIM) is the industry specific term in computer security referring to the collection of data (typically log files; e.g. eventlogs) into a central repository for trend analysis. SIM is a relatively new idea, pioneered in 1999 by a small company… …   Wikipedia

  • Security Support Provider Interface — (SSPI) программный интерфейс между приложениями и провайдерами безопасности. SSPI используется для отделения протоколов уровня приложения от деталей реализации сетевых протоколов безопасности и обеспечивает уровень абстракции для поддержки… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”