Security Log, Part 2: Requirements, Costs and Tools
Main Author: | Rocco Gagliardi |
---|---|
Other Authors: | Marc Ruef |
Format: | Article eJournal |
Bahasa: | eng |
Terbitan: |
, 2012
|
Subjects: | |
Online Access: |
https://zenodo.org/record/3520717 |
Daftar Isi:
- This article is the second in a series of two. In the first part we discussed how to approach log management and our experience with it. In this part, we'll look more specifically at the requirements and costs of the various stages as well as provide an overview of some open-source tools.
- This paper was written in 2012 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20121127 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.