_Research
_Research
Change Management Records is a systematic technique that deals with the transition
or transformation of processes, technologies, and organizational goals. It ensures that
people can adapt to deployed changes in the most efficient way possible while
minimizing the negative impact on the customer.
Ex. 2
Ex. 3
Identity Management Logs is the process that ensures that users have enough access
to technological resources. Identity management logs guarantee that only authorized
individuals have access to the technical resources required to fulfill tasks and have
permission to access particular systems. The Identity Management log associates user
limitations and permissions with IDs generated and ensures or verify access to the
system and the user’s identity’s privacy and integrity.
Ex.3
3. OS Administration Logs
Ex. 2
Ex.3
4. Perimeter Firewall and VPN Concentrator Logs
A perimeter firewall log is a security program that protects the barrier between a
corporation’s private network and public networks like the internet. All traffic
between the internal network and other networks is controlled in a perimeter firewall.
At the same time, the VPN concentrator sends log messages to EventTracker, and
manager alerts, dashboard, and reports can now be configured after setting the VPN
concentrators finished.
Ex.3
Ex. 2
Ex. 3
6. File and Directory Audits
File and directory audits allow the administrator to track file and directory changes.
The user would be able to find and follow directory changes, including the object file
or IP addresses, etc. It also provides visibility, allowing the administrator to search,
filter, review, and warn from malicious activities and detects, alert, or report what is
happening on the files and directory
Ex. 2
Ex. 3
Malware Detection logs are records of reports of the discovered malware. It assists
users or information security specialists in identifying the malware and providing
remedies to secure the system and reduce harm. The logs give the user and security
experts documentation on the types of malware encountered by the network.
Ex.3
8. Backend System Logs
Backend System logs support back-office applications, monitor important events, and
gather important metrics. Backend system logs backend developers in isolating,
replicating, and researching issues that emerge in non-debuggable situations. It
operates by receiving user input and aggregating input from other methods in order to
provide responsive output.
Application logs are data files containing information on events within a software
program. It includes components such as timestamps, context information, and log
levels. While system logs contain data about drivers and system operations. It is a file
that contains events that are changed by operating system components.
Ex.2
Ex. 3
Physical Security logs are records to easily track an organization’s users who have
access to the facilities. It is a preventative security measure of illegal or unauthorized
access to facilities, equipment, and resources and helps protect users and property
from damage.
Ex.3
11. Honeypot, Firewall, IPS, and IDS Logs
Honeypot is designed to detect, attract and investigate malicious activities wherein it
lures attackers thinking that the computer system they are trying to authorize is
legitimate. On the other hand, Firewalls are usually installed between an
organizational network and the public internet. It keeps track of all network traffic
that enters and exits the organization. The logging function documents how the
firewall manages different types of traffic. It can be used to filter out traffic. It secures
the organization by filtering inbound and outbound network traffic between private
and public internet. IDS/IPS can block malicious attempts or malicious activity and
trackback the attacker.
Ex.2
Ex.3
A web scan is a scanner that scans and finds vulnerabilities within web applications.
It scans a website, looks for flaws or issues in web applications, examines each file it
finds on the website, and runs an automated assessment for common security
vulnerabilities. Also, using web scans can help prevent unauthorized access to
corporate information and data.
Ex.3
Ex.1
Ex.2
\
Ex.3