Open Access Open Access  Restricted Access Subscription or Fee Access

Event Log Management and Monitoring

Ritesh Dhanare, Kajal Moryani, Raudat Jadliwala, Suman Gurnani

Abstract


ABSTRACT

Servers and other network devices are used widely leading to generation of huge amount of data per second. Hence the need for gathering, analyzing, managing, and monitoring this data is crucial. This paper casts light upon the need of event logging in various areas of activity such as social media, cloud computing, software and hardware security, goods, and service procurement etc. The proposed paper deals with different ways of collecting, examining, and using the data to maintain security, protect the credentials and monitor the sequence of events. In networking, SIEM or Security Information and event management software play a vital role in providing enterprise level security by capturing, analyzing, and reporting activities. In SIEM, certain acts have been enforced to look whether the monitoring, recording, and reporting of data meets the compliance or not. Multiple acts such as PCI DSS, HIPAA and FISMA have been enforced. These log activities can also be used by organizations to measure the customer behavior. However, SIEM is mostly implemented by enterprise-level organizations capable of achieving continuous improvement. The maturity model shows how capable an organization is by judging how good it is at self-improvement.

 

Keywords: Event logging, security, events, logging, log management, SIEM, social media, cloud, goods, procurement, acts, tools, log security, HIPPA, FISMA and PCIDSS


Full Text:

PDF


DOI: https://doi.org/10.37591/ijowns.v6i2.666

Refbacks

  • There are currently no refbacks.