American History
  Book Reports
  Movies & Plays
  Social Issues
  World History

  Login Here
  Forgot Password

Home / Register / Custom Writing / Contact Us

The below is a sample preview of the full essay that is available in our database. To see the full paper, just register for a free account. You get access to thousands of example term papers in our super free essay database without paying a cent.


Beginning of Paper
Auditing Computer Security

The main points I will be going over will be What is Auditing, what is an audit policy, audits and volumes, planning the policy, implementing the policy, the event viewer, and the security log. Auditing is tracking activities of users by recording selected types of events in the securit ....

Middle of Paper
.... of resources. Track trends over time by maintaining an archive of security logs. Tracking these trends is useful in determining the use of printers or files. Audits and volumes. Auditing can be set up on any computer running Window NT. However, to audit folders and files, the folder and files must be located on an NTFS volume. Planning the Policy. The audit policy determines the types of events to audit and how to track each event–by its success or failure. Before you implement the audit policy, it is important to determine the following: Determine the even ....

Words: 1212   Pages: 5 Register To View Full Essay