Describe the concerns the auditing and logging management

Assignment Help Computer Engineering
Reference no: EM133518772

Case Study: Employees can compromise an organization's confidential information, deliberately or inadvertently, through their network and Internet usage. Such concerns prompt companies to introduce security monitoring of their employees. However, they have to consider its legal and ethical aspects before deciding to track and monitor employee activities.

In addition to concerns about employees in general, IT administrators have greater access than other employees to various systems, including security log servers, Active Directory management tools, e-mail servers, and storage systems. While they need that privilege to do their jobs effectively, they can also misuse it. For this Discussion, in addition to your assigned reading, conduct some research through the Walden Library and the Internet on monitoring IT usage of employees.

Question: Briefly describe the main ethical and legal issues that organizations face in relation to security monitoring of network and Internet usage of employees. Provide your opinion about whether or not an organization should have different security monitoring policies for employees of different types and roles. Justify your opinion. In addition, explain how auditing and logging management procedures can help monitoring network and Internet usage of employees. Describe the concerns the auditing and logging management procedures would need to address in order to monitor all employees, including those with administrative access.

 

Reference no: EM133518772

Questions Cloud

Should aban use the useful information about dhs : Should Aban use the useful information about DHS even though the other information on the website is from an extremist group?
Cleavage and polyadenylation factors : Below is shown the resulting RNA Product when you perform a reaction with ALL the cleavage/polyadenylation factors and the shown full-length RNA substrate
Does the page have a footer that is split into two columns : When viewing the home page in the browser: Is it clear that this is a home page for one of the four fictional clients? Is the correct company logo at the top
Metabolic end products of carbohydrate fermentation : The metabolic end products of a carbohydrate fermentation can either be organic acids, or organic acid and gas. List one of these organic acids and one gas.
Describe the concerns the auditing and logging management : describe the main ethical and legal issues that organizations face in relation to security monitoring of network and Internet usage of employees.
Diagnosed with endometrial cancer : Melissa is a 38-year-old woman who was recently diagnosed with endometrial cancer. Explain the steps involved in this process for Melissa.
How you think you might apply the concept of business : how you think you might apply the concept of business intelligence if you were the CIO at your company. What would you be looking for? What do you think
Define zoonotic and list two additional zoonotic infections : Infections like this one are zoonotic. Define zoonotic and list two additional zoonotic infections and their causative agents.
Microscope would come in handy in gynecology clinic : What type of microscope would come in handy in the GYNECOLOGY clinic? What samples could be examined right outside the room where the women are examined?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd