Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Auditing Computer Security - Term Papers

Auditing Computer Security


The main points I will be going over will be What is Auditing, what is an audit policy, audits and volumes, planning the policy, implementing the policy, the event viewer, and the security log.
What is Auditing?
Auditing is tracking activities of users by recording selected types of events in the security log of a server or workstation. Auditing is a function of windows nt for maintaining network security. With auditing you can track user activities and system-wide events on a network, such as: the action performed, the user who performed the action, and the date and time of the action.
What is the Audit Policy?

You use the audit policy to select the types of security events that ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

first plan the policy, then implement it, and finally view the results.

You can set up on audit policy for a domain to: track the success and failure of events, such as when users attempt to log on, read a file, make changes to user and group permissions, change the security policy, and make a network connection. Eliminate or minimize the risk of unauthorized use of resources. Track trends over time by maintaining an archive of security logs. Tracking these trends is useful in determining the use of printers or files.

Audits and volumes.

Auditing can be set up on any computer running Window NT. However, to audit folders and files, the folder and files must be located on an NTFS volume.

Planning the Policy.

The audit policy determines the types of events to audit and how to track each event�by its success or failure. Before you implement the audit policy, it is important to determine the following: Determine the events to audit for your network. Determine whether to ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Auditing Computer Security. (2008, April 18). Retrieved November 28, 2024, from http://www.essayworld.com/essays/Auditing-Computer-Security/82329
"Auditing Computer Security." Essayworld.com. Essayworld.com, 18 Apr. 2008. Web. 28 Nov. 2024. <http://www.essayworld.com/essays/Auditing-Computer-Security/82329>
"Auditing Computer Security." Essayworld.com. April 18, 2008. Accessed November 28, 2024. http://www.essayworld.com/essays/Auditing-Computer-Security/82329.
"Auditing Computer Security." Essayworld.com. April 18, 2008. Accessed November 28, 2024. http://www.essayworld.com/essays/Auditing-Computer-Security/82329.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 4/18/2008 11:32:38 PM
Category: Computers
Type: Premium Paper
Words: 1201
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
The Continuous Audit
Accounting Information Systems ...
Origin Of Totalitarianism
Raspberry Pi Packet Sniffer
E-business On Demand By IBM
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved