123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Determining What To Audit And Analyzing Audit Records

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will create a list of audit requirements for a fictitious company, and then analyze common MCSE 2003 exams(http://www.mcsa-70-291.com) records found in the security log. Complete the exercises that follow. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Exercise 1: Determining What to Audit
Read the following scenario and then answer the question that follows.
Scenario You are an IT auditor at Wingtip Toys. You are asked to specify the audit requirements for a file server in the research department. The file server will store confidential research information. Files are protected by EPS encryption. Communications between researchers' workstations and the file server are protected by IPSec. Only the researchers and their workstations are allowed to access the file server.
Figure 9-23 shows the configuration for auditing for use of the Take MCSE study guides free download(http://www.examshots.com/certification/MCSE-2003-50.html) Ownership ...
... permission. To ensure that the administrator is caught, you should also audit for privilege use. Two possible events can be recorded. If the administrator attempts access while logged on interactively to the server on which the file resides, the Se_TakeownershipPrivilege, event 578, is recorded. This is a privilege usage event. However, if she takes ownership remotely, the file Take Ownership permission (WRITE_OWNER) is used. This is object access event 560. With all this noted, remember that administrators can also delete audit logs, either in their entirety or by individual events. If you have untrustworthy administrators, the only solution is to not allow them to be administrators.
Also To prevent an administrator from reading a file, you can encrypt the file. However, if you do so, make sure the administrator is not the file recovery agent. To learn why and what you can do to prevent administrators from reading sensitive files, see Lesson 5, "Designing a File Encryption and Decryption Strategy" CCNA exam(http://www.upcert.com) later in the chapter.

Total Views: 347Word Count: 329See All articles From Author

Add Comment

Business Articles

1. Lucintel Forecasts The Global Satellite Operations As A Service Market To Grow With A Cagr Of 13.3% From 2025 To 2031
Author: Lucintel LLC

2. Lucintel Forecasts The Global Satellite Operation As A Service Sale Market To Grow With A Cagr Of 13.5% From 2025 To 2031
Author: Lucintel LLC

3. Ticket Booking Api
Author: RishiHassan

4. Jewelry Photo Magic: Unveiling The Tricks Of Professional Editing
Author: ukclippingpath

5. How Outsourced Accounting Services Improve Cash Flow Visibility
Author: Harsh Vardhan

6. 5 Ways To Make Homes Safer For Seniors
Author: Jack Jones

7. اكتشفي أناقتك مع متجر عبايات: دليلك للتسوق المثالي
Author: Max

8. When Is Assisted Living Needed? 5 Signs To Watch Out For
Author: Jack Jones

9. How To Document Nonconformities In Iso 22000 Audits
Author: Jane

10. Elevate Your Career Opportunities With A Supply Chain Management Certification
Author: jayesh

11. Kpi Vs. Okr: Understanding The Difference For Smarter Goal Setting
Author: TrackHr App

12. Explore The Fascinating Businesses And Landmarks Found Along Luz Church Road
Author: jayesh

13. High Temperature Superconductors Market Size & Share, Analysis 2031
Author: Andy

14. Maximize Medical Practice Profits With Expert Revenue Cycle Management In Houston
Author: patriotmedbill

15. Enhancing Quality Of Life: The Role Of Senior Living Property Management Companies
Author: Trinity Diaz

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: