System Audit Trail Controls

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

`

Are logs that record activity at the system.

Two Types of Audit Logs: Keystroke Monitoring recording both the users keystrokes and the systems responses.

Event Monitoring summarizes key activities related to system resources.

Detecting Unauthorized Access


Real-time Detection After-the-fact Detection

Facilitating the Reconstruction of Events Promoting Personal Accountability

Implementing a System Audit Trail

Audit Objectives Relating to System Audit Trails

` `

Specify the events that are to be audited. Scan the log for unusual activity or for conditions such as:
` ` ` ` ` `

Unauthorized/Terminated User Periods of Inactivity Activity by use,workgroup, or department Log-on & log-off times Failed log-on attempts Access to specific files/applications

Monitor and report security violations.

Intranet Risks Intranets consists of small LANs and large WANs that may contain thousands of individual nodes.
   

Sniffing Access to Corporate Databases Privileged Employees Reluctance to Prosecute

You might also like