Page 1240 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1240

FIGURE 17.5 Viewing a log entry

               As long as the identification and authentication processes are secure,
               this is enough to hold Darril accountable for accessing the file. On the

               other hand, if the organization doesn’t use secure authentication
               processes and it’s easy for someone to impersonate another user,
               Darril may be wrongly accused. This reinforces the requirement for
               secure identification and authentication practices as a prerequisite for
               accountability.




                             Logs are often referred to as audit logs, and logging is

                  often called audit logging. However, it’s important to realize that
                  auditing (described later in this chapter) is more than just logging.

                  Logging will record events whereas auditing examines or inspects
                  an environment for compliance.




               Common Log Types

               There are many different types of logs. The following is a short list of
               common logs available within an IT environment.

               Security Logs Security logs record access to resources such as files,
   1235   1236   1237   1238   1239   1240   1241   1242   1243   1244   1245