Professional Documents
Culture Documents
And Network
System Audit Trails are logs that record activity at the system, application,
and user level. Audit trails typically consists of 2 types of audit logs: (1)
detailed logs of invidual keystrokes and (2) event oriented logs.
Intranets consists of small LANs and large WANs that may contain
thousands of individual nodes.
3 of the more significant business risks associated with Internet risks:
1. IP spoofing
2. Denial of service attacks:
● SYN flood
● Smurf
● Distributed denial of service (DDos)
3. Equipment failures
The most common problem in data communications is data loss due to line
error. The following two techniques are commonly used to detect and
correct such data errors before they are processed:
1. Echo check
2. Parity check