Although Novell Netware 286 provides excellent access control at both the server and the directory level, the record they make available through the accounting function leaves much to be desired. This paper presents two programs; the first is a BASIC program that converts the output of Novell's PAUDIT command into single line audit trails, providing an auditable record of server access. The second program, written in dBase III+, can be used to insure that all PC's accessing the LAN are recorded in an inventory data base. The subject network consists of six file servers connecting approximately 500 users at the main office of WSRC's Engineering and Projects Division. Hard copy and diskettes of the source code will be available
This Project work has been divided into three parts. In the first part, we deal with the Linux opera...
SIGLEAvailable from British Library Document Supply Centre- DSC:92/13931(Audit) / BLDSC - British Li...
Configurational audit deals with identifying oversights or omissions in the use of otherwise secure ...
In prior work we described techniques used to capture, store, and retrieve narrative data forms from...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Includes bibliographical references.During the decade of the 1950's, first generation computers were...
Includes bibliographical references (leaves 167-173)Accounting systems of large (Fortune 500) corpor...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
With the LAN network we can get information between Workstation Workstation with each other and can ...
M.Com. (Computer Auditing)The management and control of modern day computer systems are becoming mor...
ii iii A file server, one of the places where a company stores it data, is a goldmine. In the beginn...
The organization of the RIACS auditing package is described along with how to installation instructi...
This Project work has been divided into three parts. In the first part, we deal with the Linux opera...
SIGLEAvailable from British Library Document Supply Centre- DSC:92/13931(Audit) / BLDSC - British Li...
Configurational audit deals with identifying oversights or omissions in the use of otherwise secure ...
In prior work we described techniques used to capture, store, and retrieve narrative data forms from...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Includes bibliographical references.During the decade of the 1950's, first generation computers were...
Includes bibliographical references (leaves 167-173)Accounting systems of large (Fortune 500) corpor...
The central role of audit trails, or (more properly) logs, in security monitoring needs little descr...
We present constructs that create, manage, and verify digital audit trails for versioning file syste...
With the LAN network we can get information between Workstation Workstation with each other and can ...
M.Com. (Computer Auditing)The management and control of modern day computer systems are becoming mor...
ii iii A file server, one of the places where a company stores it data, is a goldmine. In the beginn...
The organization of the RIACS auditing package is described along with how to installation instructi...
This Project work has been divided into three parts. In the first part, we deal with the Linux opera...
SIGLEAvailable from British Library Document Supply Centre- DSC:92/13931(Audit) / BLDSC - British Li...
Configurational audit deals with identifying oversights or omissions in the use of otherwise secure ...