O'Reilly logo

The Basics of Information Security, 2nd Edition by Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Auditing and Accountability

We discuss the use of auditing and accountability in this chapter. We talk about the need to hold others accountable when we provide access to the resources on which our businesses are based on to personal information of a sensitive nature. We also go over the processes we carry out in order to ensure that our environment is compliant with the laws, regulations, and policies that bind it, referred to as auditing. In addition, we address the tools we use to support auditing, accountability, and monitoring activities, such as logging and monitoring.

Keywords

Accountability; admissibility; assessments; auditing; deterrence; intrusion detection; intrusion prevention; logging; monitoring; nonrepudiation

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required