How can logging play a role in stopping security breaches in a system?

How can logging play a role in stopping security breaches in a system?

How can logging play a role in stopping security breaches in a system?

A.
Logging is the activity of collecting system information that will be used formonitoring and auditing to enable early detection of security problems.

B.
Logging is the cataloging of performance issues to fight intruders.

C.
Logging plays a very minimal role in system security; it is used more as ahousekeeping measure than as a factor in an effective security policy.

D.
Logging is the process of identifying user errors and not security breaches.

Explanation:
Logging is the activity of collecting system information that will be used formonitoring and auditing to enable early detection of security problems.countability is tracked by recording user, system, and application activities.This recording is done through auditing functions and mechanisms within an operatingsystem or application. Audit trails contain information about operating systemactivities, application events, and user actions.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

I have the same idea. A

Sam

Sam

I Guess A but mostly D would also be Correct.

A

A

Actually, no. Within the context of Security (CISSP) only A is correct. It’s not our job to track user error’s – it’s our job to track security issues.