Going Beyond Logs: Using Metadata + Benchmarks

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

Email metadata

includes headers and other information found in an email

2
New cards

Mobile metadata

is collected by phones and other mobile devices as they are used

3
New cards

Web metadata

is embedded into websites as part of the code of the website but its often invisible to everyday users

4
New cards

File metadata

can be a powerful tool when reviewing when a file was created, how it was created, if and when it was modified, who modified it, the GPS location of the device that created it, and many other details

5
New cards

Benchmarks

configure systems to a known standard security configuration, but ___ also often include log settings. That means that a well-constructed ___ might require central logging, configuring log and alerting levels, and that endpoints or servers log critical and important events