Page 743 - StudyBook.pdf
P. 743

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  727

                 to log on, activities performed by users and by the system, and problems that tran-
                 spired. Logs are not only a function of OSes, but may also be provided through a
                 wide variety of applications. For example, while Windows provides logs dealing
                 with the OS, additional logs may be provided through the firewall running on the
                 server.
                    Logs can also provide insight into physical security problems. Computerized
                 door lock systems may require a PIN number, biometrics, or card key before access
                 is granted. In other cases, a system may be implemented requiring a person to sign
                 their name before entering a secure area. Logs of such entries may correspond to a
                 problem occurring and provide valuable information of who caused or witnessed it.
                    Inventories provide a record of devices and software making up a network.As
                 seen earlier, such inventories should be as thorough as possible. Inventories provide
                 a record that can be used to determine which computers require upgrades, which
                 are old and need to be removed from service, and other common tasks.When
                 changes occur on a network, such as switching to a more secure protocol, the
                 inventory can be consulted to determine if all machines have been changed over.
                 Failing to perform uniform upgrades on all machines can pose a security threat, as
                 insecure protocols or services that are no longer needed but still running on
                 machines can be exploited.
                    Inventories are also useful when disasters occur. Imagine a fire burning up all
                 the computers in a department. By consulting the inventory, the administrator can
                 recoup their losses through insurance, by showing which machines were destroyed.
                 When new machines are acquired, the inventory can again be used to set up the
                 new equipment with the same configurations as those they are replacing.
                    Inventories and logs are also used as a reference of common tasks, to ensure
                 they were done and to provide a record of when they were performed and who
                 completed the job. For example, backup logs are often used to record what data
                 was backed up on a server, which tape it was placed on, when the backup
                 occurred, who set up the backup, and the type of backup that was performed.
                 When certain information is needed, the log can then be referred to so that the
                 correct tape can be used to restore the backup. Similar logs and inventories can also
                 be used to monitor diagnostics that are run, performance tests, and other tasks that
                 are routinely carried out.

                 Classification

                 In order for users to be aware of what information they can share with certain
                 members of their organization, distribute to the public, or keep to themselves, a




                                                                              www.syngress.com
   738   739   740   741   742   743   744   745   746   747   748