Information assurance is a way of assessing the usefulness and
Please define the goals of an access control monitoring system. Describe the types of checks and balances that should be implemented into a network’s design to ensure that access control is being maintained. Describe what information can be obtained from the unauthorized access attempts audit logs. Explain the best practices for log archival.
Leave a Reply
Want to join the discussion?Feel free to contribute!