The Roles of Auditing and Monitoring

Explain how auditing and monitoring can be used as operations security tools.

  • Explain how audit logs can be used to monitor activity and detect intrusions.

  • Discuss intrusion detection.

  • Explain penetration testing techniques.

Auditing is often defined as the process of checking current activity against policy. In the United States, a letter announcing that the Internal Revenue Service will audit you induces panic. Your entries on a tax return will be judged against a set of laws that few understand completely, that all must pretend to know to file their taxes, and that even experts disagree upon. An audit of your information systems compliance with security policy should be less stress inducing, at least where ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.