Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
Other PrODuctS 235
like Network Time Protocol is required) across the whole network
(or at least most of it)—what is the point of a SIEM solution if some
parts of the network are o-limits to log capture? e idea is that if an
attack is under way, the organization can detect it and potentially even
avert some of the impact of the incident. If some parts of the network
are blind to the SIEM, the chances of enabling an eective incident
response strategy are reduced. If log capture is only enabled for the
top 10% most critical devices, the chances of being able to respond in
a timely manner are dramatically reduced.
What does network-wide capture of log messages entail? It entails
network logging to be enabled on all networked devices that ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355