Access Control 36


Access Control 36 : Computer Security: (4) Accountability: Accountability uses such system components as audit trails (records) and logs to associate a subject with its actions. The information recorded should be sufficient to map the subject to a controlling user. Audit trails and logs are important for: (a) Detecting security violations. (b) Re-creating security incidents. If no one is regularly reviewing your logs and they are not maintained in a secure and consistent manner, they may not be admissible as evidence. . Many systems can generate automated reports based on certain predefined criteria or thresholds, known as clipping levels. For example, a clipping level may be set to generate a report for the following: (a) More than three failed logon attempts in a given period; (b) Any attempt to use a disabled user account. These reports help a system administrator or security administrator to more easily identify possible break-in attempts. Definition of clipping level: a disk's ability to maintain its magnetic properties and hold its content. A high-quality level range is 65-70%; low quality is below 55%
No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved