Computer Security Threat Monitoring and Surveillance

Computer Security Threat Monitoring and Surveillance Computer Security Threat Monitoring and Surveillance

csrc.nist.gov
from csrc.nist.gov More from this publisher
15.07.2013 Views

Obviously with the records being dropped and added the other consider­ ation is that a previous history record does not exist for a par­ ticular user. In this case, new master records are created and insert­ ed in the correct place. No statistical reporting or distribution tests are performed in this case, but the absolute limits tests are recorded. In order to provide the security officer with some notion of what is going on, an exception report item is created for the session summary records that indicates that a new history master record is being created, and the new master record is avail­ able for display as part of the exception reporting.

Job/User Identification Program Sort by Jobid/Userid Keep First of Each 'Job' Parameter Editor FIGURE 5 Processing to Audit File Use to Main Audit Run

Obviously with the records being dropped <strong>and</strong> added the other consider­<br />

ation is that a previous history record does not exist for a par­<br />

ticular user. In this case, new master records are created <strong>and</strong> insert­<br />

ed in the correct place. No statistical reporting or distribution<br />

tests are performed in this case, but the absolute limits tests are<br />

recorded. In order to provide the security officer with some<br />

notion of what is going on, an exception report item is created<br />

for the session summary records that indicates that a new history<br />

master record is being created, <strong>and</strong> the new master record is avail­<br />

able for display as part of the exception reporting.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!