Saturday, June 22, 2019

Coursework Example | Topics and Well Written Essays - 1250 words

Coursework ExampleThis is both(prenominal)thing that is very much costly as it has been seen where some clients left the company in question and went to the competing company. In apprisal to the above case, there is a need of reviewing some of the policies in relation to the employee access to data and the revealing of information to parties that atomic number 18 not associated with the firm. There are some proposed policy changes that might just go a long way in preventing a repeat of the same from happening. Some of these include 1. Termination or revoking of whatever access tools the terminated employee might be having in relation to the companys database. 2. Wiping away of all the enter files that whitethorn be related to to the employee who has left the firm. 3. Instituting rules and regulations that have legal implications in the event that there is flaunting of these rules and this is in particular regard to the sensitive nature which information may be characterized. a lliance records prove to be something that is rather vital for the survival of a particular firm. For this reason there has to be the devising of some policies that result bring almost the safeguarding of this information. One of the policies that may be of focus in this case is the development of log files which will enable the administrator to keep track of the employee activities in the body. These files will bring to light what that particular employee has done in the system and what information he or she has accessed. In addition to this it provides tracks such that there will be evidence available when it is needed. Assignment 3 The issue of logging user activities in systems has become something that is of the essence to most organizations that are after the safeguarding of the information which they possess. In this particular case having a deeper understanding of just what logging entails will be something that is rather important in a bid to understanding the enormousn ess of the matter. These log files come up in various systems and means of access that may be there to the users of computers. Some may be in relation to the websites which these users access while others may be in relation to the information on the system which these same users access at times. The development and application of the log files will be dependent on the type of environment that the particular user is in. Some of the logfiles may be in the online environment while others are just used in the typical database. The language used in their development will also depend on the language that the environment is founded on. These may be web-based languages such as PHP and HTML while others may be reliant on the database systems such as My SQL. Some of these logging utilities come with the system upon purchase while at the same time there are those that are custom made for the purpose of meeting the specific firm requirements. Of these it is more advantageous to come up with a system that can provide the tracking and warnings or notifications in the event that the set barriers are violated. This is where developing of the logs as opposed to their purchase is of importance. What a person can create a person can also destroy. What this means is the fact that these log files can be bypassed by whoever has a critical knowledge of just how good they work. It will be particularly hard to develop a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.