Security Log, Part 2: Requirements, Costs and Tools

Main Author: Rocco Gagliardi
Other Authors: Marc Ruef
Format: Article eJournal
Bahasa: eng
Terbitan: , 2012
Subjects:
PHP
SSH
VPN
Online Access: https://zenodo.org/record/3520717
Daftar Isi:
  • This article is the second in a series of two. In the first part we discussed how to approach log management and our experience with it. In this part, we'll look more specifically at the requirements and costs of the various stages as well as provide an overview of some open-source tools.
  • This paper was written in 2012 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20121127 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.