• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Auditing Resource Access

Just as permissions may be set on resources by using an access control list, so a user's successes or failures in accessing the resource can be audited. This is controlled through what is sometimes called a System Access Control List, but can be thought of as an audit control list. A Discretionary Access Control List says "Allow this user read access" or "Forbid this user write access." Auditing allows the owner to say "Record in the security log if this user succeeds in deleting files in this folder," "Record in the security log if any user fails in an attempt to write to files in this folder," and so on.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint