How software and network security can keep systems and data secure?
Audit Log
An Audit Log would typically be used to track down any action that would typically be performed by any users that would be on the network. Some of the stuff that it may keep a record of is how long a user is conencted onto the networ, what time they connected on the network and what time they logged out of the network. It can also be used as a form of proof should anyone within the organisation claim not to be using the network when in actual fact they are using it.
For example of where this is used is that within an organisation someone may claim that they aren't using the network whereas they can track whether specific information about the user that they can use against them should they try to claim not to be on it. The reason why this can keep data secure is by keeping an audit log of who has been given the data and how long they have used that data from. This means that the organisation is able to track who has what piece of data and also how long they have been given that data.
