Skip to Content
Foundations of Information Security
book

Foundations of Information Security

by Jason Andress
October 2019
Beginner
248 pages
7h 7m
English
No Starch Press
Content preview from Foundations of Information Security

4AUDITING AND ACCOUNTABILITY

Image

When you’ve successfully gone through the identification, authentication, and authorization processes (or even while you’re still completing them), you need to keep track of the activities taking place in your organization. Even after you’ve allowed a party access to your resources, you still need to ensure that they behave in accordance with your rules, particularly those relating to security, business conduct, and ethics. Essentially, you need to make sure you can hold users of your systems accountable (Figure 4-1).

Figure 4-1: You should always hold users accountable.

Holding someone accountable means making sure ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Fundamentals of Information Systems Security, 3rd Edition

Fundamentals of Information Systems Security, 3rd Edition

David Kim, Michael G. Solomon
Defensive Security Handbook

Defensive Security Handbook

Lee Brotherston, Amanda Berlin
Security in Computing

Security in Computing

Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies

Publisher Resources

ISBN: 9781098122546