Question: * * Choose a Company * * . ( You will refer to this Company through EVERY Section ) Describe what audit data is and

**Choose a Company**.(You will refer to this Company through EVERY Section)
Describe what audit data is and how it is used.
In the framework of the network and servers what devices should audit data (security logs) be collected and where it should be stored.
Describe a process or policy for how and when audit data should be reviewed.
Also take this opportunity to discuss the security of audit data, meaning, just because data is collected and reviewed, does this mean it is secure and accurate.
Discuss Intrusion Tools and Techniques.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!