subject

You and your coworkers are designing the audit policy for WeServeU, the banking entity you’ve worked with on prior activities. Make an argument for why the audit system should be able to search for each of the following log items: user, action performed, time of action, and location.

For each item, include two reasons you would want to conduct a search on it: First, after you have reason to believe your system has been compromised in some way, and second, how you would monitor each item in routine audits to look for “suspicious behavior”/explain what “suspicious behavior” would look like during a routine audit.

Then, argue for a specific lockout policy for each of the following groups: customers; staff (workers); and IT administrators.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 19:00, devila321
When keyboarding, if you want to be fast and accurate you should return your hands on home row with your fingers relaxed and your eyes on the text use only your index fingers to hunt and peck keep your fingers stiff and your eyes on the keys slouch in your chair and keep your fingers hovering over all of the keys
Answers: 2
image
Computers and Technology, 22.06.2019 08:40, baue4431
What are the three parts to physical security standards for various types of army equipment and the risk level
Answers: 2
image
Computers and Technology, 22.06.2019 18:30, dpinzoner5952
Which of the following commands is more recommended while creating a bot?
Answers: 1
image
Computers and Technology, 23.06.2019 18:30, janny48
How often does colleges update the cost of attendance on their website? . a)every two years b) every four years c) every year d) every semester
Answers: 1
You know the right answer?
You and your coworkers are designing the audit policy for WeServeU, the banking entity you’ve worked...

Questions in other subjects:

Konu
Mathematics, 14.02.2020 03:50
Konu
Mathematics, 14.02.2020 03:50