Next | Prev | Up | Top | Contents | Index
Potential Security Violations
The overwhelming majority of records in an audit trail are the result of the normal actions of users doing their jobs. No automated tool exists to locate records that signify the actions of abusers trying to violate system security. Nonetheless, an administrator can apply some general rules to detect abuse or violation of security policy. This list of tips is neither complete nor universal. Each administrator must customize the list to meet the particular needs of each site.
- Use and Abuse by Outsiders
-
- Use and Abuse by Insiders
-
- Proper and Improper Management
-
Next | Prev | Up | Top | Contents | Index