This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Chapter 12 Case Project 12 -4 Auditing successful access to files in a directory that contains highly confidential files can help you trace the necessary information that is created from a user performing a task. Tasks are normally connected to permissions constructed on the Access Control List of a resource, User Rights constructed for a particular computer, and Administrative rights, normally approved through group connection. If a user makes an attempt to do a task which they have been approved the correct authorization, they will create a success prompt for that task. A good example here could be a user that has been assigned authorization to change the relationship of a group placed in Active Directory. 12 5 Data protection comes in the form of fault-tolerant disk configurations, which can be hardware or software. The two most popular configurations are disk mirroring and disk striping with parity.software....
View Full Document
This note was uploaded on 07/24/2009 for the course BIS 220 taught by Professor Gold during the Summer '08 term at DeVry Cincinnati.
- Summer '08