Page 1251 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1251

Both statistical and nonstatistical sampling are valid

                  mechanisms to create summaries or overviews of large bodies of
                  audit data. However, statistical sampling is more reliable and

                  mathematically defensible.



               Other Monitoring Tools

               Although logs are the primary tools used with auditing, there are some
               additional tools used within organizations that are worth mentioning.

               For example, a closed-circuit television (CCTV) can automatically
               record events onto tape for later review. Security personnel can also
               watch a live CCTV system for unwanted, unauthorized, or illegal
               activities in real time. This system can work alone or in conjunction
               with security guards, who themselves can be monitored by the CCTV

               and held accountable for any illegal or unethical activity. Other tools
               include keystroke monitoring, traffic analysis monitoring, trend
               analysis monitoring, and monitoring to prevent data loss.

               Keystroke Monitoring Keystroke monitoring is the act of recording
               the keystrokes a user performs on a physical keyboard. The
               monitoring is commonly done via technical means such as a hardware
               device or a software program known as a keylogger. However, a video

               recorder can perform visual monitoring. In most cases, attackers use
               keystroke monitoring for malicious purposes. In extreme
               circumstances and highly restricted environments, an organization
               might implement keystroke monitoring to audit and analyze user
               activity.

               Keystroke monitoring is often compared to wiretapping. There is some
               debate about whether keystroke monitoring should be restricted and

               controlled in the same manner as telephone wiretaps. Many
               organizations that employ keystroke monitoring notify both
               authorized and unauthorized users of such monitoring through
               employment agreements, security policies, or warning banners at sign-
               on or login areas.
   1246   1247   1248   1249   1250   1251   1252   1253   1254   1255   1256