叡智の三猿

〜森羅万象を「情報セキュリティ」で語る

当サイトは、アフィリエイト広告を使用しています。

Log(ログ):A to Z Information Security



Log: The Computer's Diary

A log is like a diary or journal that computers keep. It writes down everything that happens so we can look back and see what occurred!

What is a log?

Imagine you keep a diary where you write:

  • "Monday 9:00 AM - Woke up"
  • "Monday 9:30 AM - Ate breakfast"
  • "Monday 10:00 AM - Went to school"

Computers do the same thing! They keep logs that record:

  • Who logged in
  • What files were opened
  • What programs were used
  • When errors happened
  • Who visited a website

Why are logs important?

  • For security: "Did a hacker break in?", "When did the attack happen?", "What did the hacker do?"
  • For troubleshooting: "Why did the program crash?", "When did the error start?", "What went wrong?"
  • For monitoring: "Is everything working correctly?", "How many people visited our website today?"

What do logs look like?


[2025-11-08 09:15:23] User "Sarah" logged in
[2025-11-08 09:16:45] User "Sarah" opened file "homework.doc"
[2025-11-08 09:45:12] User "Sarah" logged out

Each line shows:

  • The date and time
  • What happened
  • Who did it

Logs are like clues for detectives! When something bad happens (like a security breach), security experts look at the logs. The logs tell the story of what happened, like footprints left behind by a burglar!

Types of logs:

  • System logs - What the computer is doing
  • Security logs - Login attempts and security events
  • Application logs - What programs are doing
  • Network logs - Traffic going in and out

Why logs matter for security:

If a hacker breaks in, the logs can show:

  • When they got in
  • What they looked at
  • What they stole
  • How they got in

Without logs, we'd never know what happened! It would be like a crime with no evidence.

Important to remember:

Logs should be protected too! Smart hackers try to delete logs to cover their tracks, like erasing their footprints!

Logs are the computer's memory of everything that happened!




問題1: Log(ログ)は、コンピュータで起きた出来事を記録したものである。


問題2: Logには、誰がいつログインしたかという情報は含まれない。


問題3: セキュリティ専門家は、Logを調べることで攻撃の痕跡を見つけることができる。


問題4: Logは、プログラムがクラッシュした原因を調べるのに役立つ。


問題5: ハッカーは自分の痕跡を隠すために、Logを削除しようとすることがある。