I dont think that "network logging" has a specific meaning ! 

What I suspect they are getting at is audit trails of network activity -
which can mean many things - for example from the "topical" list - 

Legitimate activity on an internal network - when they log in, what
transactions they do, when they log out
Intrusion attempts - failed password attempts, attacks on specific ports
etc.
Employee internet usage

The question "is our network loggin" adequate, is impossible to answer
because at the end of the day, network logging is just another detect
control - and needs to be looked at in the context of every other control on
your business systems. After all, knowing that somebody has hacked into your
network is pretty important, but not as important as stopping them in the
first place, and the log is pretty useless if to find the hack, you have to
sift through 2 million legitimate accesses a day to find them !    


Nick Avery
Head of Internal Audit
The Tote 


---------------------------------------------------------
This e-mail and its contents are confidential.  If you have
received this e-mail in error, please notify us and delete it from your
computer.
You should not copy or use it for any purpose or disclose its contents
to any other person.
Whilst we believe this e-mail and its attachments are free from any virus
or other defect which might affect any computer or IT system where it is
opened, we will not be held responsible for any loss or damage arising from
it.


Reply via email to