Page 51 - StudyBook.pdf
P. 51

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  35


                 Figure 1.11 A Logon/Logoff Failure Event Description





































                 Logging

                 The logging features provided on most networks and systems involve logging
                 known or partially known resource event activities.While these logs are sometimes
                 used for analyzing system problems, they are also useful for finding security issues
                 through processing the log files and checking for both valid and invalid system
                 activities
                    Most modern database applications support some level of transaction log
                 detailing the activities that occurred within the database.This log can then be used
                 to rebuild the database or to create a duplicate database at another location.
                 Providing this detailed level of database logging consumes a great deal of drive
                 space.This intense logging is not needed for most applications.You will generally
                 only have basic informative messages utilized in system resource logging unless
                 additional audit details are enabled.
                    A great deal of information on logging and log analysis can be found at
                 http://www.loganalysis.org.Additionally more information on log analysis can be



                                                                              www.syngress.com
   46   47   48   49   50   51   52   53   54   55   56