|
The below is a sample preview of the full essay that is available in our database. To see
the full paper, just register for a free account. You get
access to thousands of example term papers in our super free essay database without paying
a cent.
|
Beginning of Paper
Auditing Computer Security
The main points I will be going over will be What is Auditing, what is an audit policy, audits and volumes, planning the policy, implementing the policy, the event viewer, and the security log.
Auditing is tracking activities of users by recording selected types of events in the security log of ....
|
|
Middle of Paper
.... of resources. Track trends over time by maintaining an archive of security logs. Tracking these trends is useful in determining the use of printers or files.
Audits and volumes.
Auditing can be set up on any computer running Window NT. However, to audit folders and files, the folder and files must be located on an NTFS volume.
Planning the Policy.
The audit policy determines the types of events to audit and how to track each event–by its success or failure. Before you implement the audit policy, it is important to determine the following: Determi ....
|
|
|