Page 1241 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1241

folders, printers, and so on. For example, they can record when a user
               accessed, modified, or deleted a file, as shown earlier in Figure 17.5.

               Many systems automatically record access to key system files but
               require an administrator to enable auditing on other resources before
               logging access. For example, administrators might configure logging
               for proprietary data, but not for public data posted on a website.

               System Logs System logs record system events such as when a
               system starts or stops, or when services start or stop. If attackers are

               able to shut down a system and reboot it with a CD or USB flash drive,
               they can steal data from the system without any record of the data
               access. Similarly, if attackers are able to stop a service that is
               monitoring the system, they may be able to access the system without
               the logs recording their actions. Logs that detect when systems reboot,
               or when services stop, can help administrators discover potentially
               malicious activity.


               Application Logs These logs record information for specific
               applications. Application developers choose what to record in the
               application logs. For example, a database developer can choose to
               record when anyone accesses specific data objects such as tables or
               views.

               Firewall Logs Firewall logs can record events related to any traffic
               that reaches a firewall. This includes traffic that the firewall allows and

               traffic that the firewall blocks. These logs commonly log key packet
               information such as source and destination IP addresses, and source
               and destination ports, but not the actual contents of the packets.

               Proxy Logs Proxy servers improve internet access performance for
               users and can control what websites users can visit. Proxy logs include
               the ability to record details such as what sites specific users visit and
               how much time they spend on these sites. They can also record when

               users attempt to visit known prohibited sites.

               Change Logs Change logs record change requests, approvals, and
               actual changes to a system as a part of an overall change management
               process. A change log can be manually created or created from an
               internal web page as personnel record activity related to a change.
               Change logs are useful to track approved changes. They can also be
   1236   1237   1238   1239   1240   1241   1242   1243   1244   1245   1246