figshare
Browse
Farrell-EZproxy_metrics_and_breaches.pdf (958.89 kB)

EZproxy logs security breach management and access metrics

Download (958.89 kB)
presentation
posted on 2019-05-09, 23:25 authored by Linda FarrellLinda Farrell
Presentation at ANZREG 2018
EZproxy log analysis for proactive security breach management and rich access metrics focusing on two main areas:
1. The importance of addressing compromised user accounts in order to firstly ensure the continual availability of electronic resources to all users, and secondly to prevent the violation of provider license agreements. The practices and workflows before Splunk and after implementation of Splunk will be discussed by looking at challenges and successes.
2. The use of enriched EZproxy access logs statistics to support librarians in making evidence based decisions on collection development and management. How did Monash do it before Splunk and how has Splunk changed our practices.


History