This set of topics discuss various techniques for monitoring and auditing security on your system.
In a security audit, you would be reviewing and examining the activities of a data processing system to test the adequacy and effectiveness of procedures for data security and data accuracy. The security audit journal is the primary source of auditing information on the system. A security auditor inside or outside your organization can use the auditing function provided by the system to gather information about security-related events that occur on the system.
An intrusion detection system is software that detects attempts or successful attacks on monitored resources that are part of a network or host system.
Monitoring security regularly has two basic goals:
This set of topics describes the tasks for auditing and monitoring system security: