2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet726/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   722   723   724   725   726   727   728   729   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Monitoring Techniques 
Monitoring
is the process of reviewing information logs looking for something specifi c. 
Personnel can manually review logs, or use tools to automate the process. Monitoring is 
necessary to detect malicious actions by subjects as well as attempted intrusions and system 
failures. It can help reconstruct events, provide evidence for prosecution, and create reports 
for analysis. 
It’s important to understand that monitoring is a continuous process. Continuous moni-
toring ensures that all events are recorded and can be investigated later if necessary. Many 
organizations increase logging in response to an incident or a suspected incident to gather 
additional intelligence on attackers. 


Logging, Monitoring, and Auditing 
779
Log analysis
is a detailed and systematic form of monitoring in which the logged infor-
mation is analyzed for trends and patterns as well as abnormal, unauthorized, illegal, 
and policy-violating activities. Log analysis isn’t necessarily in response to an incident but 
instead a periodic task, which can detect potential issues.
When manually analyzing logs, administrators simply open the log files and look for 
relevant data. This can be very tedious and time consuming. For example, searching 10 
different archived logs for a specific event or ID code can take some time, even when using 
built-in search tools.
In many cases, logs can produce so much information that important details can get 
lost in the sheer volume of data, so administrators often use automated tools to analyze the 
log data. For example, intrusion detection systems (IDSs) actively monitor multiple logs to 
detect and respond to malicious intrusions in real time. An IDS can help detect and track 
attacks from external attackers, send alerts to administrators, and record attackers’ access 
to resources.
Multiple vendors sell operations management software that actively monitors the secu-
rity, health, and performance of systems throughout a network. This software automati-
cally looks for suspicious or abnormal activities that indicate problems such as an attack or 
unauthorized access.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   722   723   724   725   726   727   728   729   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish