Page 1240 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1240
FIGURE 17.5 Viewing a log entry
As long as the identification and authentication processes are secure,
this is enough to hold Darril accountable for accessing the file. On the
other hand, if the organization doesn’t use secure authentication
processes and it’s easy for someone to impersonate another user,
Darril may be wrongly accused. This reinforces the requirement for
secure identification and authentication practices as a prerequisite for
accountability.
Logs are often referred to as audit logs, and logging is
often called audit logging. However, it’s important to realize that
auditing (described later in this chapter) is more than just logging.
Logging will record events whereas auditing examines or inspects
an environment for compliance.
Common Log Types
There are many different types of logs. The following is a short list of
common logs available within an IT environment.
Security Logs Security logs record access to resources such as files,

