unit_3_p5_tech_7350_c4 - TECH 7350 Managing Information...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Unit 3 Chapter 4 Access Control Types Access Control Types Part 5 of 5 Part 5 of 5 2 Accountability Auditing capabilities ensure users are accountable for their interactions Tracked and recorded System level auditing Monitor system performance Logon attempts Login In Data and time of each logon attempt Lockouts of users and terminals Devices used Functions performed 3 Key-Stroke Monitoring Tracking the key strokes of the user during an active session Unusual to do this unless there is some cause The amount of data collected here is massive Privacy Issues Proper Notification in Security Policies and Training Notice Banner Individual boundaries start and stop TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 4 Protecting Data Protecting Audit Data and Log Information Limit access to the system administrator and...
View Full Document

Page1 / 5

unit_3_p5_tech_7350_c4 - TECH 7350 Managing Information...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online