Security Event Log definition

Security Event Log means any event, notification or alert that a device, systems or software is technically capable of producing in relation to its status, functions and activities. Security Events Logs are not limited to security devices, but are applicable to all devices, systems and software that are technically capable of producing event logs that can be used in security investigations, auditing and monitoring. Examples of Systems that can produce security event logs are, but not limited to: firewalls, intrusion prevention systems, routers, switches, content filtering, network traffic flow logs, network, authentication services, directory services, DHCP, DNS, hardware platforms, virtualization platforms, servers, operating systems , web servers, databases, applications , application/layer 7 firewalls.
Security Event Log means a system that Logs e.g. access or attempted access to systems, resources and data (including personal data); changes to system configuration and policies; use of privileges or utility programs and applications; files accessed or deleted; alarms raised by the access control system; activation and deactivation of security systems; account management events; system errors and warnings; restart or shutdown of an application or system itself; or any other significant action that could impact security.
Security Event Log means event logs that can be used in security, auditing or monitoring and can give rise to a security incident, information incident or security investigation. For clarity, Security Event Logs are not limited to those generated by security devices, but are those generated by all devices, systems and software that are technically capable of producing event logs that can be used in security investigations, auditing and monitoring. The guiding principle for Security Event Logs is the mandatory enablement of logging to ensure post determination of what identity performed what action, when, and from where (IP address).

Related to Security Event Log

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Collateral Event means that no Relevant Entity has credit ratings at least equal to the Approved Ratings Threshold.

  • Collateral Event of Default has the meaning set forth in Section 13.01(b).

  • Threshold Event Collateral shall have the meaning assigned to such term in Section 5(g).