Abstract

Although a computer system's primary defense is its access controls, it is plain from numerous newspaper accounts of break-ins and computerized thefts that access control mechanisms cannot be relied on in most cases to safeguard against a penetration or insider attack. Most computer systems have security weaknesses that leave them vulnerable to attack and abuse. Finding and fixing all the flaws is not technically feasible, and building systems with no security vulnerabilities is extremely difficult, if not generally impossible. Moreover, even the most secure systems are vulnerable to abuse by insiders who misuse their privileges. Audit trails can help ensure the accountability of users for their actions. Audit trails have been viewed as the final defense, not only because of their deterrent value but because in theory they can be perused for suspicious events and provide evidence to establish the guilt or innocence of suspected individuals. Moreover, audit trails may be the only means of detecting authori...

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call