- Reviewing accounting logs: standard system-provided accounting logs
should be reviewed by appointed security personnel for the system, to ascertain
whether there is any activity or pattern of activities that might indicate an
electronic attack has occurred. At this level, consideration should be given to the
use of automated audit tools.
Email this to a friend.
Previous item —