Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:NIST_Special_Publication
|
| gptkbp:author |
Karen Kent
Johannes M. F. Turner Murk J. Souppaya William J. Mehringer |
| gptkbp:documentType |
800-92
|
| gptkbp:focusesOn |
computer security log management
|
| gptkbp:guidanceSystem |
log management
log analysis log monitoring log retention log protection |
| gptkbp:partOfSeries |
gptkb:NIST_Special_Publication_800_Series
|
| gptkbp:publicationDate |
September 2006
|
| gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
| gptkbp:targetAudience |
IT professionals
security managers system administrators |
| gptkbp:title |
gptkb:Guide_to_Computer_Security_Log_Management
|
| gptkbp:url |
https://csrc.nist.gov/publications/detail/sp/800-92/final
|
| gptkbp:bfsParent |
gptkb:NIST_CSRC
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-92
|