ALL >> Business >> View Article
Determining What To Audit And Analyzing Audit Records
In this practice, you will create a list of audit requirements for a fictitious company, and then analyze common MCSE 2003 exams(http://www.mcsa-70-291.com) records found in the security log. Complete the exercises that follow. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Exercise 1: Determining What to Audit
Read the following scenario and then answer the question that follows.
Scenario You are an IT auditor at Wingtip Toys. You are asked to specify the audit requirements for a file server in the research department. The file server will store confidential research information. Files are protected by EPS encryption. Communications between researchers' workstations and the file server are protected by IPSec. Only the researchers and their workstations are allowed to access the file server.
Figure 9-23 shows the configuration for auditing for use of the Take MCSE study guides free download(http://www.examshots.com/certification/MCSE-2003-50.html) Ownership ...
... permission. To ensure that the administrator is caught, you should also audit for privilege use. Two possible events can be recorded. If the administrator attempts access while logged on interactively to the server on which the file resides, the Se_TakeownershipPrivilege, event 578, is recorded. This is a privilege usage event. However, if she takes ownership remotely, the file Take Ownership permission (WRITE_OWNER) is used. This is object access event 560. With all this noted, remember that administrators can also delete audit logs, either in their entirety or by individual events. If you have untrustworthy administrators, the only solution is to not allow them to be administrators.
Also To prevent an administrator from reading a file, you can encrypt the file. However, if you do so, make sure the administrator is not the file recovery agent. To learn why and what you can do to prevent administrators from reading sensitive files, see Lesson 5, "Designing a File Encryption and Decryption Strategy" CCNA exam(http://www.upcert.com) later in the chapter.
Add Comment
Business Articles
1. Top Bearing Company Delivering Reliable Performance For Trucks And Industrial ApplicationsAuthor: Bee Overseas
2. Choosing The Right Garden Fencing And Driveway Gates For Your Uk Home
Author: Vikram Kumar
3. The Castle Has No Walls: Why Enterprise Security Must Move Beyond The Perimeter
Author: Robert
4. How Koel Colours Is Shaping The Future Of Cosmetic Pigments In 2026
Author: koel
5. Loyalty Platform Guide: Features, Top Providers & How To Choose The Right One
Author: Ravi Kuamr
6. Vashikaran Astrologer In India | Ram Ratan Shastri Ji
Author: Ram Ratan Shastri Ji.
7. Kitchen Cabinets Marble – A Perfect Blend Of Style And Functionality
Author: mike
8. Why Pharma Brands Need Effective Visual Merchandising In Retail Pharmacies | Brandola
Author: Brandola
9. The Automation Standard: Achieving Zero Tolerance With An Automatic Fly Ash Brick Making Machine
Author: Karmyog India
10. Italian Marble Table – A Symbol Of Luxury And Timeless Elegance
Author: mike
11. The Real Impact Of Back Pain Therapy In Worcestershire
Author: Energize Therapy
12. The Benefits That A Digital Business Card Promises
Author: Angus Carruthers
13. What Factors Contribute Towards The Success Of A Virtual Receptionist?
Author: Eliza Garran
14. Lucintel Forecasts The Global Gate Driver Ic Market To Reach $2,905 Million By 2035
Author: Lucintel LLC
15. Lucintel Forecasts The Global Exosome Research Market To Reach $1,125 Million By 2035
Author: Lucintel LLC






