123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Determining What To Audit And Analyzing Audit Records

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will create a list of audit requirements for a fictitious company, and then analyze common MCSE 2003 exams(http://www.mcsa-70-291.com) records found in the security log. Complete the exercises that follow. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Exercise 1: Determining What to Audit
Read the following scenario and then answer the question that follows.
Scenario You are an IT auditor at Wingtip Toys. You are asked to specify the audit requirements for a file server in the research department. The file server will store confidential research information. Files are protected by EPS encryption. Communications between researchers' workstations and the file server are protected by IPSec. Only the researchers and their workstations are allowed to access the file server.
Figure 9-23 shows the configuration for auditing for use of the Take MCSE study guides free download(http://www.examshots.com/certification/MCSE-2003-50.html) Ownership ...
... permission. To ensure that the administrator is caught, you should also audit for privilege use. Two possible events can be recorded. If the administrator attempts access while logged on interactively to the server on which the file resides, the Se_TakeownershipPrivilege, event 578, is recorded. This is a privilege usage event. However, if she takes ownership remotely, the file Take Ownership permission (WRITE_OWNER) is used. This is object access event 560. With all this noted, remember that administrators can also delete audit logs, either in their entirety or by individual events. If you have untrustworthy administrators, the only solution is to not allow them to be administrators.
Also To prevent an administrator from reading a file, you can encrypt the file. However, if you do so, make sure the administrator is not the file recovery agent. To learn why and what you can do to prevent administrators from reading sensitive files, see Lesson 5, "Designing a File Encryption and Decryption Strategy" CCNA exam(http://www.upcert.com) later in the chapter.

Total Views: 371Word Count: 329See All articles From Author

Add Comment

Business Articles

1. Fitatoo Smile Eco Raglan Hoodie Sustainable Streetwear In The Uk
Author: Fitatoo

2. Bridging Knowledge Gaps In Hse Through Interactive E-learning
Author: Jane

3. Role Of Quick Lime In The Pulp And Paper Industry: Uses And Benefits
Author: Shaurya Minerals

4. Top 5 Mistakes Homeowners Make When Hiring A Builder In Chennai And How To Avoid Them
Author: bharathi

5. Bpo Projects For Startup Company: Grow With Zoetic Bpo Services
Author: mohan

6. Scorpio Technologies – The Leading Responsive Web Design Company In Chennai
Author: scorpiotechnologies

7. Scorpio Technologies: The Best Web Design Service In Chennai
Author: scorpiotechnologies

8. Latest Indo Western Dress – Elegant Fusion Fashion
Author: le concept

9. Top Logo Designer In Ahmedabad: Crafting Unique Brand Identities That Speak Volumes
Author: Kymin Creation

10. What Types Of Noise Barriers Are Used To Lessen Noise Pollution?
Author: O'Neill Engineered Systems, Inc

11. Why Are Container Inspections Important For Safety?
Author: TIC

12. 10 Essential Tips For During Production Inspection
Author: TIC

13. What Is A Pre Production Inspection And Why Is It Important?
Author: TIC

14. How Does Quality Inspection Impact Product Quality?
Author: TIC

15. 8 Benefits Of Regular Quality Inspections
Author: TIC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: