Security Intelligence – How to Leverage Log Services to Analyze C&C Traffic 3.14 3.14.6 System and Information integrity
This article discusses how to utilize log services to detect attacks and indicators of attacks.
This article discusses how to utilize log services to detect attacks and indicators of attacks.
This article describes how log management, identifying log types to collect and how log reviews will identify unauthorized access to organizational systems
This blog post describes the details of several network traffic monitoring tools.
This resource offers assessment guidance for a related control (NIST SP 800-53 SC-10)
Common Vulnerabilities Exposure is a list of entries - each containing an identification number, a description, and at least one public reference - for publicly known cybersecurity vulnerabilities.
This is an example of a logging policy, including system and application logging elements that if logged correctly, will aid in identifying unauthorized access and use.
The official Ubuntu website provides open source and proprietary antivirus options that support Ubuntu and other flavors of Linux.
This sample policy from The University of Mary Washington is an example of a standard to promote a secure computing environment.
This YouTube video discusses malware in the context of information security.