0% found this document useful (0 votes)
39 views

Auditing Operating System and Network

The document discusses security components of operating systems and networks. It describes how operating systems use access control lists to determine who can access which resources and what actions they can take. It also discusses log-on procedures, access tokens, discretionary access privileges, password control, virus control, system audit trails, and event monitoring as key security components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Auditing Operating System and Network

The document discusses security components of operating systems and networks. It describes how operating systems use access control lists to determine who can access which resources and what actions they can take. It also discusses log-on procedures, access tokens, discretionary access privileges, password control, virus control, system audit trails, and event monitoring as key security components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Auditing

Operating
System and
Network

Operatin
g
System
is the

computers
control
program.

Operating system
security
involves policies and controls that
determine
who can access
which resources
what action they can take

4
Security
Components

Log-on Procedure

Access token
contains key
information
user ID and
password
privileges
granted to the
user.

ACCESS CONTROL LIST


Contained in
When a
System compares the access
user
privileges
token with
attempt to
those
access a
contained in
resource
ACCESS
CONTROL

DISCRETIONARY ACCESS
PRIVILEGE
Controller
of
General
Ledger

Manager of
Budgeting
Department
Read only
privilege
Accounts Payable
Manager
Both read and
write privileges

4
Operating
System

Access Privilege

Access Privileges = Assigned Duties

Password
Control

Quality of Security = Quality of

Virus Control

System Audit Trail


are logs that record
activity at the system.

Keystroke
Monitoring
records both
the users
keystroke
and the
systems
response.

EVENT MONITORING

You might also like