ABSTRACT

Today’s business and computing environments have blurred traditional boundaries between what is considered trusted and untrusted. As a result, organizations are taking measures to protect their information assets. Information from various sources in an organization’s network is key to managing security. Such information comes from a number of security devices (intrusion detection systems and firewalls), operating systems, and network devices such as switches and routers.