Abstract
As more comp uters are connected to each other via enterprise wide networks and the Internet, information security and the implementation of security policies and procedures are becoming of paramount importance. All security information is logged in security audit logs. Currently, information security is being enforced via enterprise application suites based on platform specific security agents. These agents are installed at every workstation where security has to be enforced. These agents are however, only a small part of vast application suites and have many limitations. There is clearly room for improvement. The Generic Proactive Audit Log Model does away with agents to rather duplicate security audit logs on a dedicated log server. On this server extensive and intelligent audit log analysis can be performed to verify and enforce security policies to a much greater extent.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35575-7_19
Chapter PDF
Similar content being viewed by others
Key words
Bibliography
Axent. (1998). Intruder Alert. [online]. Available from Internet: URL http://www.axent.com/product/smsbu/ITA/default.htm
Computer Associates. (1998). Unicenter TNG: Total Enterprise Management. USO498EN U.S.A.
Krige, W. (1999). The usage of audit logs for effective information security management. Unpublished master’s thesis. Port Elizabeth Technikon, Port Elizabeth, South Africa.
US. Department of Commerce. (1995). An introduction to computer security: The NIST handbook. Washington: U.S. Government Printing Office.
Von Solms, R. (1993). A process approach to information security management. IFIP’93, WG 11. 1, Toronto, Canada, 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Olivier, W., von Solms, R. (1999). The Effective Utilization of Audit Logs in Information Security Management. In: Eloff, J.H.P., Labuschagne, L., von Solms, R., Verschuren, J. (eds) Information Security Management & Small Systems Security. IFIP — The International Federation for Information Processing, vol 26. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35575-7_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-35575-7_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5483-4
Online ISBN: 978-0-387-35575-7
eBook Packages: Springer Book Archive