Page 1248 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1248

Log analysis is a detailed and systematic form of monitoring in which
               the logged information is analyzed for trends and patterns as well as

               abnormal, unauthorized, illegal, and policy-violating activities. Log
               analysis isn’t necessarily in response to an incident but instead a
               periodic task, which can detect potential issues.

               When manually analyzing logs, administrators simply open the log
               files and look for relevant data. This can be very tedious and time
               consuming. For example, searching 10 different archived logs for a

               specific event or ID code can take some time, even when using built-in
               search tools.

               In many cases, logs can produce so much information that important
               details can get lost in the sheer volume of data, so administrators often
               use automated tools to analyze the log data. For example, intrusion
               detection systems (IDSs) actively monitor multiple logs to detect and
               respond to malicious intrusions in real time. An IDS can help detect

               and track attacks from external attackers, send alerts to
               administrators, and record attackers’ access to resources.

               Multiple vendors sell operations management software that actively
               monitors the security, health, and performance of systems throughout
               a network. This software automatically looks for suspicious or
               abnormal activities that indicate problems such as an attack or
               unauthorized access.



               Security Information and Event Management
               Many organizations use a centralized application to automate

               monitoring of systems on a network. Several terms are used to
               describe these tools, including security information and event
               management (SIEM), security event management (SEM), and security
               information management (SIM). These tools provide real-time
               analysis of events occurring on systems throughout an organization.
               They include agents installed on remote systems that monitor for

               specific events known as alarm triggers. When the trigger occurs, the
               agents report the event back to the central monitoring software.

               For example, a SIEM can monitor a group of email servers. Each time
               one of the email servers logs an event, a SIEM agent examines the
   1243   1244   1245   1246   1247   1248   1249   1250   1251   1252   1253