Monitoring security

There is more than one technique available for monitoring and auditing security on your system. Consider the information presented here when choosing the best technique or combination of techniques for your system.

In a security audit, you need to review and examine the activities of a data processing system to test the adequacy and effectiveness of procedures for data security and data accuracy. The security audit journal is the primary source of auditing information on the system. A security auditor inside or outside your organization can use the auditing function provided by the system to gather information about security-related events that occur on the system.

An intrusion detection system is software that detects attempts or successful attacks on monitored resources that are part of a network or host system.

Monitoring security regularly has two basic goals:
  • Making sure that you protect your company resources adequately
  • Detecting unauthorized attempts to access your system and your company’s information