From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Accounting and logging activity

Accounting and logging activity

From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Start my 1-month free trial

Accounting and logging activity

- [Instructor] To gain access into a system, the user authenticates by providing a username and password. Authorization determines whether or not they're allowed on the network and what they can access. And accounting logs the session. Accounting and auditing detects and records or logs events such as a user attempting to create, access, or delete files and folders. Along with non-security related events, such as starting or stopping a service. Auditing is done for a variety of reasons as it is a means to monitor what users and processes on the system are doing. Auditing can also alert the administrator to unusual or suspicious activities that suggest further investigation. Most operating systems, network services and devices offer logging capabilities. Keep in mind, logging occurs after an event. However, it's a critical component in a comprehensive security plan. Capturing data in the logs, and then carefully reviewing…

Contents