Safeguard Network  «Prev  Next»
Lesson 7 Auditing
Objective Describe how log files help detect security breaches.

Log Files detect Security Breaches


You can take a more proactive approach to system security by monitoring the system access and keeping logs on activity conducted to detect security problems and ensure that only authorized users have access. This is called network auditing. Many utilities are now available to system administrators that detect intruders and perform additional system and network monitoring functions. When selecting network auditing software, activity logs should be examined for the following:
  1. Attempts at unauthorized access (failed logins)
  2. File access attempts and denials
  3. Attempts to change the permissions settings on a file
  4. Attempts to change the log
The figure below shows a partial log file.
In the next lesson, you will learn how user and server authentication is used to provide network security.

Log File
Log File

Access Control Encryption Digital Signatures - Quiz

Click the Quiz link below to test your understanding of access control, encryption, and digital signatures.
Access Control Encryption Digital Signatures - Quiz