Monitoring System Access and Use

System access must be monitored regularly to thwart attempts at unauthorised access and to confirm that access control standards are effective.

For large networks, or where intrusion would have serious consequences, Intrusion Detection Systems are used.

To view the related Policy click      

 

  • Without frequent monitoring, it is difficult to assess the effectiveness of your access controls. Unauthorised access can remain undetected, enabling knowledge of this 'security hole' to be passed to persons with possible malicious or fraudulent intent. The consequences can be serious.

There is 1 Key Action providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Without hard evidence of a security breach, it is difficult to take disciplinary action, and it may be impossible to take legal action, say under the Computer Misuse Act.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page