Question: ? ONE of the audit steps from Chapter 8: Auditing Unix and Linux Operating Systems ? Describe the audit step and how you would conduct

? ONE of the audit steps from Chapter 8: Auditing Unix and Linux Operating Systems ? Describe the audit step and how you would conduct it for the case study company. Include specific procedures for performing and validating the audit step and any expected results. make assumptions but should document those assumptions in your report.

? ONE of the audit steps from Chapter 8: Auditing
8. Ensure that each account is associated with and can be traced easily to a specific employee. If the owner of an account is not readily apparent, it will impede forensic investigations regarding inappropriate actions performed by that account. If multiple people use an account, no accountability can be established for actions performed by that account. How Review the contents of the password file(s). The owner of each account should be obvi- ous, with the user's name or other unique identifier (such as employee number) either used as the username or placed in the GECOS field. Question any accounts that seem to be shared, such as guest or application accounts. If accounts such as these are required, they should be configured with restricted shells and/or such that a user cannot directly log into them (thus requiring the user to log in as himself or herself first and then using su or sudo to access the shared account, creating an audit trail)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!