Chapter 9. Logging Events and Monitoring the Cardholder Data Environment
When most people think about information security, the idea of blocking, deflecting, denying, or otherwise stopping a malicious hacker attack comes to mind. Secure network architecture, secure server operating systems, data encryption, and other security technologies are deployed to actually shield your assets from that evil influence that can steal your information, commit fraud, or disrupt the operation of systems and networks.
Indeed, the visions of tall castle walls, deep moats, or more modern armor and battleships pervade most people's view of warfare as well as information security. However, there is more to warfare (and more to security!) than armor and shields. No, ...

Get PCI Compliance, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.