to protect users from each other,3. to protect users from themselves,4. to protect it from itself, and5. to protect itself from its environment.

PTS: 1

2. What are the three security objectives of audit trails? Explain.

What will be an ideal response?

Audit trails support system security objectives in three ways. By detecting unauthorized access to the system, the audit trail protects the system from outsiders trying to breach system controls. By monitoring system performance, changes in the system may be detected. The audit trail can also contribute to reconstructing events such as system failures, security breaches, and processing errors. In addition, the ability to monitor user activity can support increased personal accountability.

PTS: 1

Computer Science & Information Technology

You might also like to view...

A limitation of Mac OS X is that it ________

a.can't be updated over the Internet. b.can't be used in a home network. c.does not have a GUI. d.only runs on Mac computers.

Computer Science & Information Technology

The Significance argument in a PERCENTRANK function is the input for confidence intervals

Indicate whether the statement is true or false

Computer Science & Information Technology