Log files or audit logs are files that record information about events that occur on a computer system at all times, that is if the log files are configured correctly. Most information security officers do not use this resource to its fullest potential. Even though log files are kept on a computer system they can be regarded as dead data, simply because they are very seldom used by the information security officer(s), unless a crisis arises. Thus, some information security officers do not consider log files to be of much importance and have the opinion that the log files just take up space and other valuable resources. However, log files can be used more proactively to improve the information security of an organisation. The primary object...
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in I...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Data intensive computing research and technology developments offer the potential of providing signi...
AbstractLog management and analysis is a vital part of organization's network management and system ...
As log files increase in size, it becomes increasingly difficult to manually detect errors within th...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
With ubiquitous computing becoming pervasive in every aspect of societies around the world and the e...
World Wide Web is widely accessed by people for accessing services, social networking and so on. All...
design. First layer, named the event source layer, describes sources of information that can be used...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
The increasing popularity of network technology has brought convenience to human life.People have st...
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in I...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Data intensive computing research and technology developments offer the potential of providing signi...
AbstractLog management and analysis is a vital part of organization's network management and system ...
As log files increase in size, it becomes increasingly difficult to manually detect errors within th...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them,...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
As internet activity and the use of technology increase so does the landscape for vulnerabilities th...
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially...
With ubiquitous computing becoming pervasive in every aspect of societies around the world and the e...
World Wide Web is widely accessed by people for accessing services, social networking and so on. All...
design. First layer, named the event source layer, describes sources of information that can be used...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
The increasing popularity of network technology has brought convenience to human life.People have st...
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in I...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Data intensive computing research and technology developments offer the potential of providing signi...