• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 17. Data Security > Protecting Your Company's Data

Protecting Your Company's Data

Audit Logs

In order to protect your company's data from these human threats, there are steps you can take. Audit logs are a record of who has been using a computer system. As a user logs onto a computer, it records the time, the name of the user, the files that person accesses, and when the person logs off. The computer then keeps the data in a special security file.

In some cases an audit log can tell whether files have been altered. The use of audit logs is usually provided as part of security password software that can be installed on individual computers. If a computer crime occurs, the log can furnish the authorities with evidence they might need to prosecute.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint