Security Part 1: Auditing Operating Systems and Networks
This document provides an overview of operating system security and auditing. It discusses operating system objectives like translating languages and allocating resources. It also covers operating system security policies and controls like log-on procedures, access tokens, and access control lists. Potential threats are outlined such as privileged users abusing access and viruses. Controls and audit tests are then described, including controlling access privileges, passwords, viruses, and system audit trails to detect unauthorized access and promote accountability. Network auditing risks are also briefly mentioned.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
87 views9 pages
Security Part 1: Auditing Operating Systems and Networks
This document provides an overview of operating system security and auditing. It discusses operating system objectives like translating languages and allocating resources. It also covers operating system security policies and controls like log-on procedures, access tokens, and access control lists. Potential threats are outlined such as privileged users abusing access and viruses. Controls and audit tests are then described, including controlling access privileges, passwords, viruses, and system audit trails to detect unauthorized access and promote accountability. Network auditing risks are also briefly mentioned.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9
CHAPTER 3
Security Part 1: Auditing Operating Systems and Networks
Operating Systems • Computer’s control program • Operating System Objectives • Translate high level languages into machine level language that a computer can execute. (Compilers and Interpreters) • Allocates computer resources to users, workgroups and applications. • Manages the task of job scheduling and multi programming Operating System Security • Policies, procedures and controls that determine who can access the Operating system • LOG-ON PROCEDURES • First line of defense against unathorized users (ID and Password) • ACCESS TOKEN • Used to approved all actions of user • ACCESS CONTROL LIST • Assigned to each IT Resource • DISCRETIONARY ACCESS PRIVILEGES • Users grants access privileges to others. Threats to Operating System Integrity • Privileged personnel who abuse their authority. System administrators and programmers require unlimited access to the OS to perform maintenance and to recover from system failures. • Individuals, both external and internal to the organization, who browse the OS identify and exploit security flaws • Individual who intentionally or accidentally insert computer viruses or other destructive programs into the OS. Operating System Controls and Audit Test • Control Access Privileges • Audit obejectives is to verify access privileges granted in a manner that is consistent with the need to separate incompatible functions and is in accordance with the organizations policy. • Password Control • Secret code that a user enters to gain access to the systems, application, data files or network server. • Reusable and One time Password • Virus Control • Key to virus control is the strict adherance to the organizational policies and procedures that guard against virus infection • System Audit Trail Control • Logs that record activity at the system, application and user level • Keystore Monitoring and Event Monitoring • Setting Audit Trail Objectives 1. Detecting unauthorized access to the system 2. Facilitatuing the reconstruction of events 3. Promoting personal accountability Implementing a System Audit Trail • The information contained in audit logs is useful to accountants in measuring the potential damage and financial loss associated with application errors, abuse of authority or unauthorized access by outside intruders. Auditing Networks • Intranet Risks • Interception of network messages • Access to corporate database Lopez),