Consider an automated audit log analysis tool. This tool could be used to distinguish “suspicious activities” from normal user behaviour on a system for some organisations. (This tool could be used for many more purposes as well.) Explain the limitations of the “automated audit log analysis tool” as a security control? explain in detail ....

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Consider an automated audit log analysis tool. This tool could be used to distinguish “suspicious activities” from normal user behaviour on a system for some organisations. (This tool could be used for many more purposes as well.)

Explain the limitations of the “automated audit log analysis tool” as a security control? explain in detail ....

Expert Solution
Step 1

Automated audit log analysis tool

Automated audit log analysis tools have become essential in the troubleshooting. With the logging analysis tools that also known as network log analysis tools where the user can extract the meaningful data from the logs to pinpoint the root cause of any app or the system error, and find the trends and patterns to help guide their business decisions, investigations, and the security. DevOps, the security professionals, web developers, the system administrators, the network administrators, and the site reliability engineers can use them to make the better data-driven decisions.

Monitoring the network activity can be a tedious task, but there are the good reasons to do it. For one, it allows the user to find and investigate the suspicious logins on the workstations, devices connected to the networks, and servers while identifying the sources of administrator abuse. The user can also trace the software installations and the data transfers to identify the potential issues in a real time rather than after damage is done.

 

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Maintenance
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education