subject

You and your coworkers are designing the audit policy for WeServeU, the banking entity you’ve worked with on prior activities. Make an argument for why the audit system should be able to search for each of the following log items: user, action performed, time of action, and location.

For each item, include two reasons you would want to conduct a search on it: First, after you have reason to believe your system has been compromised in some way, and second, how you would monitor each item in routine audits to look for “suspicious behavior”/explain what “suspicious behavior” would look like during a routine audit.

Then, argue for a specific lockout policy for each of the following groups: customers; staff (workers); and IT administrators.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
The editing of digital photos us about the same level of difficulty as editing an analog photo
Answers: 2
question
Computers and Technology, 22.06.2019 12:40
How do i get the most points, without any effort?
Answers: 2
question
Computers and Technology, 23.06.2019 02:00
Which software would you use to create a print design? a. illustrator b. audacity c. reaper d. dreamweaver
Answers: 2
question
Computers and Technology, 23.06.2019 20:50
3.11.3 quiz: comparing and analyzing function typesquestion 4 of 102 pointswhat can you say about the y-values of the two functions f(x) = 3x2-3 andg(x)=2* - 3?
Answers: 2
You know the right answer?
You and your coworkers are designing the audit policy for WeServeU, the banking entity you’ve worked...
Questions
question
Mathematics, 10.02.2021 20:30
question
Mathematics, 10.02.2021 20:30
question
Mathematics, 10.02.2021 20:30
question
Mathematics, 10.02.2021 20:30
question
Mathematics, 10.02.2021 20:30
Questions on the website: 13722361