Supriya Ghosh (Editor)

Security log

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit

A security log is used to track security-related information on a computer system. Examples include:

  • Windows Security Log
  • Internet Connection Firewall security log
  • According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special software."

    References

    Security log Wikipedia


    Similar Topics