0% found this document useful (0 votes)
87 views9 pages

Security Part 1: Auditing Operating Systems and Networks

This document provides an overview of operating system security and auditing. It discusses operating system objectives like translating languages and allocating resources. It also covers operating system security policies and controls like log-on procedures, access tokens, and access control lists. Potential threats are outlined such as privileged users abusing access and viruses. Controls and audit tests are then described, including controlling access privileges, passwords, viruses, and system audit trails to detect unauthorized access and promote accountability. Network auditing risks are also briefly mentioned.

Uploaded by

Joan Marie Geron
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views9 pages

Security Part 1: Auditing Operating Systems and Networks

This document provides an overview of operating system security and auditing. It discusses operating system objectives like translating languages and allocating resources. It also covers operating system security policies and controls like log-on procedures, access tokens, and access control lists. Potential threats are outlined such as privileged users abusing access and viruses. Controls and audit tests are then described, including controlling access privileges, passwords, viruses, and system audit trails to detect unauthorized access and promote accountability. Network auditing risks are also briefly mentioned.

Uploaded by

Joan Marie Geron
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

CHAPTER 3

Security Part 1: Auditing Operating Systems and Networks


Operating Systems
• Computer’s control program
• Operating System Objectives
• Translate high level languages into machine level language that a computer
can execute. (Compilers and Interpreters)
• Allocates computer resources to users, workgroups and applications.
• Manages the task of job scheduling and multi programming
Operating System Security
• Policies, procedures and controls that determine who can access the
Operating system
• LOG-ON PROCEDURES
• First line of defense against unathorized users (ID and Password)
• ACCESS TOKEN
• Used to approved all actions of user
• ACCESS CONTROL LIST
• Assigned to each IT Resource
• DISCRETIONARY ACCESS PRIVILEGES
• Users grants access privileges to others.
Threats to Operating System Integrity
• Privileged personnel who abuse their authority. System
administrators and programmers require unlimited access to the OS
to perform maintenance and to recover from system failures.
• Individuals, both external and internal to the organization, who
browse the OS identify and exploit security flaws
• Individual who intentionally or accidentally insert computer viruses or
other destructive programs into the OS.
Operating System Controls and Audit Test
• Control Access Privileges
• Audit obejectives is to verify access privileges granted in a manner that is
consistent with the need to separate incompatible functions and is in
accordance with the organizations policy.
• Password Control
• Secret code that a user enters to gain access to the systems, application, data
files or network server.
• Reusable and One time Password
• Virus Control
• Key to virus control is the strict adherance to the organizational policies and
procedures that guard against virus infection
• System Audit Trail Control
• Logs that record activity at the system, application and user level
• Keystore Monitoring and Event Monitoring
• Setting Audit Trail Objectives
1. Detecting unauthorized access to the system
2. Facilitatuing the reconstruction of events
3. Promoting personal accountability
Implementing a System Audit Trail
• The information contained in audit logs is useful to accountants in
measuring the potential damage and financial loss associated with
application errors, abuse of authority or unauthorized access by
outside intruders.
Auditing Networks
• Intranet Risks
• Interception of network messages
• Access to corporate database
Lopez),

You might also like