Chapter 12 Case Project 12-4 & 12-5

Chapter 12 Case Project 12-4 & 12-5 - Chapter 12 Case...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 12 Case Project 12 -4 Auditing successful access to files in a directory that contains highly confidential files can help you trace the necessary information that is created from a user performing a task. Tasks are normally connected to permissions constructed on the Access Control List of a resource, User Rights constructed for a particular computer, and Administrative rights, normally approved through group connection. If a user makes an attempt to do a task which they have been approved the correct authorization, they will create a success prompt for that task. A good example here could be a user that has been assigned authorization to change the relationship of a group placed in Active Directory. 12 5 Data protection comes in the form of fault-tolerant disk configurations, which can be hardware or software. The two most popular configurations are disk mirroring and disk striping with parity.software....
View Full Document

This note was uploaded on 07/24/2009 for the course BIS 220 taught by Professor Gold during the Summer '08 term at DeVry Cincinnati.

Page1 / 2

Chapter 12 Case Project 12-4 & 12-5 - Chapter 12 Case...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online