Next | Prev | Up | Top | Contents | Index

Potential Security Violations

The overwhelming majority of records in an audit trail are the result of the normal actions of users doing their jobs. No automated tool exists to locate records that signify the actions of abusers trying to violate system security. Nonetheless, an administrator can apply some general rules to detect abuse or violation of security policy. This list of tips is neither complete nor universal. Each administrator must customize the list to meet the particular needs of each site.


Use and Abuse by Outsiders
Use and Abuse by Insiders
Proper and Improper Management

Next | Prev | Up | Top | Contents | Index