“It depends on what the meaning of the word ‘is’ is.”
|--excerpts from Bill Clinton’s Grand Jury testimony|
No system or network service is 100% secure. Security is an ongoing process. All the precautions and steps taken during the installation and configuration of an operating system and its services are just the beginning. Routine audits of the system and services are critical. There are many ways to monitor the integrity of a system. An important part of auditing is the correct management and monitoring of log files. Sometimes, the default log settings for a system or service are not sufficient. Even then, log files are of no use unless they are routinely monitored.
The goal of this chapter is to point out the importance ...