|Like this CertiGuide? Get it in PDF format!|
Use coupon code "certiguide" to save 20%!
|Need more practice? 300 additional Security+ questions!|
|Get It Here!|
Auditing, the last item in
the AAA of security, is the process of monitoring a system or network,
looking for potential security exposures or incidents, and verifying
proper operation and configuration. The system that
you are auditing may be a network, a computer, or your computing environment
as a whole (including disaster recovery, physical security, processes,
The two most common approaches to
system and network auditing today include configuration analysis/log
analysis and vulnerability scanning.
Auditing involves monitoring a system or network, looking for potential security exposures or incidents, and verifying proper operation and configuration. Auditing can be performed in many ways, such as analyzing logs (which provides information about past events on the network/system) and system/network scanning (which provides information about the current state of the system/network.)
|If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!|
Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.