SlideShare a Scribd company logo
Logging
Inappropriate logging.
Types Of Issues
Incorrect time synchronization.
Logging of sensitive information.
Unauthorized access to logs.
Incorrect Time Synchronization
If the time of the logs is desynchronized it will make it difficult to
perform forensic investigation in case of a break-in.
Logging Of Sensitive Information
Some types of information such as user session ids, passwords, credit
card numbers, cvv data and more should not be logged.
Unauthorized Access To Logs
Log files may contain sensitive data and therefore needs to be protected.
Lab
We will explore some of these areas in more detail.

More Related Content

Viewers also liked (13)

PPTX
snmp
حسن رشید
 
PPTX
Desmitificando SNMP
ManageEngine
 
PPTX
SOC2016 - The Investigation Labyrinth
chrissanders88
 
PDF
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
vivekrajan
 
PPTX
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
BizTalk360
 
PPT
Using Canary Honeypots for Network Security Monitoring
chrissanders88
 
PPTX
ELK at LinkedIn - Kafka, scaling, lessons learned
Tin Le
 
PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
chrissanders88
 
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
chrissanders88
 
PPTX
Art into Science 2017 - Investigation Theory: A Cognitive Approach
chrissanders88
 
PDF
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
PDF
Monitoring the ELK stack using Zabbix and Grafana (Dennis Kanbier / 26-11-2015)
Nederlandstalige Zabbix Gebruikersgroep
 
Desmitificando SNMP
ManageEngine
 
SOC2016 - The Investigation Labyrinth
chrissanders88
 
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
vivekrajan
 
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
BizTalk360
 
Using Canary Honeypots for Network Security Monitoring
chrissanders88
 
ELK at LinkedIn - Kafka, scaling, lessons learned
Tin Le
 
Applied Detection and Analysis with Flow Data - SO Con 2014
chrissanders88
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
chrissanders88
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
chrissanders88
 
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
 
Monitoring the ELK stack using Zabbix and Grafana (Dennis Kanbier / 26-11-2015)
Nederlandstalige Zabbix Gebruikersgroep
 

More from Websecurify (12)

PDF
Security Challenges in Node.js
Websecurify
 
PDF
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Websecurify
 
PDF
Unicode - Hacking The International Character System
Websecurify
 
PDF
Next Generation of Web Application Security Tools
Websecurify
 
PDF
Web Application Security 101 - 14 Data Validation
Websecurify
 
PDF
Web Application Security 101 - 10 Server Tier
Websecurify
 
PDF
Web Application Security 101 - 07 Session Management
Websecurify
 
PDF
Web Application Security 101 - 06 Authentication
Websecurify
 
PDF
Web Application Security 101 - 05 Enumeration
Websecurify
 
PDF
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
PDF
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
PDF
Web Application Security 101 - 02 The Basics
Websecurify
 
Security Challenges in Node.js
Websecurify
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Websecurify
 
Unicode - Hacking The International Character System
Websecurify
 
Next Generation of Web Application Security Tools
Websecurify
 
Web Application Security 101 - 14 Data Validation
Websecurify
 
Web Application Security 101 - 10 Server Tier
Websecurify
 
Web Application Security 101 - 07 Session Management
Websecurify
 
Web Application Security 101 - 06 Authentication
Websecurify
 
Web Application Security 101 - 05 Enumeration
Websecurify
 
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
Web Application Security 101 - 02 The Basics
Websecurify
 
Ad

Recently uploaded (20)

PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
PPTX
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PDF
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PPTX
Transforming Mining & Engineering Operations with Odoo ERP | Streamline Proje...
SatishKumar2651
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
Transforming Mining & Engineering Operations with Odoo ERP | Streamline Proje...
SatishKumar2651
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
Ad

Web Application Security 101 - 12 Logging