Previous Page  32 / 35 Next Page
Information
Show Menu
Previous Page 32 / 35 Next Page
Page Background

At the same time, limiting data access and logging

operations are precautions that should be applied as a

solution.

In this context, log management is given the highest

priority by Insurance Information and Monitoring Center.

By applying a special log management solution on the

database, administrators and end user actions will be

monitored, they will be analyzed with logs from other

systems, and correlations will be made with Security

Information and Event Management solution ‘SIEM’ to

produce significant relevant results. Log types which will

be basically monitored are:

Security logs: Log-ins with wrong passwords, lock of user

identity, new password requests, etc.

Transaction logs: End user activities, authorized

user activities, system administrator activities, user

creation-deletion, data interventions, etc.

Increase in digitalization and networking, particularly in

terms of “data” concept, which had been pretty ignored in

the past, is now the most valuable asset in today’s business

world. The role of data, within the privacy and quality

concept, is growing day by day and institutions who use

“data” more functionally get one step ahead in competition.

With the advances in technology, business world can now

perform things once they could never imagine; however, it

must never be forgotten that hackers also use more creative

technological methods. In parallel with changes; asocial,

young hackers have now left their places to organized

hacker teams with high damage capacities, who work

professionally for private bodies, attacking their targets with

great concentration.

This new approach of new generation

hackers caused troubles for many countries

and international giant companies in

recent years, and revealed the method of

target-based attacks (Advanced Persistent

Threat, APT) adopted by hackers.

Also, with widespread use of mobile

internet access and rapid growth of

broadband mobile networks; office and

business hours concept has become a

bit outdated. For employees, data can be

accessed anytime, anywhere now. Briefly,

for employees, anywhere with a tablet

computer, smart phone and laptop is an

office where they can continue their work

from where they left.

Considering all such risks, the first step

for providing data security is to increase

corporate Information Security awareness.

Data Security and Log Management

CISA

,

Information Security and

Risk Manager

(SBM)

İlyas

KAYMAKÇI

INFORMATION SECURITY

32