Jump to content

Security log

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by Tom.Reding (talk | contribs) at 20:58, 29 June 2016 (References: Rem stub tag (class = non-stub & non-list) using AWB). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

A security log is used to track security-related information on a computer system. Examples include:

According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special software."[1]

See also

[edit]

References

[edit]