O'Reilly logo

Breaking into Information Security by Chris Liu, Anthony J. Stieber, Josh More

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1.1

Tier 1—Log Reviewer

Abstract

Log reviewers periodically review files that store critical log data within your environment. In many organizations, this role is entry-level. At a technical level, most people never interact with logs or even know they exist. Logs are often dull, but they can hide gems deep within. It can be interesting to trace a 20-year-old bug as you trace network traffic from one system to another to identify why a particular log entry keeps recurring. By comparing log activity with known events, and by comparing logs of different systems, the log reviewer can start to build the skill of understanding the environment. A seasoned log reviewer will understand what a particular log entry really means, and if it’s normal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required