Information Systems Audit Trails; An Australian Government Survey
نویسنده
چکیده
Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 47 Information Systems Audit Trails; An Australian Government Survey Caroline Allinson Manager Information Security, Information Management Division, Queensland Police Service, GPO Box 1440, BRISBANE Qld 4001, Australia. and Information Security Research Centre (ISRC), Queensland University of Technology, Brisbane. Queensland. Australia.
منابع مشابه
Design and Implementation of Verifiable Audit Trails for a Versioning File System
We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Digital audit trails create an analog of the paper audit process for fi...
متن کاملReal-time workflow audit data integration into data warehouse systems
Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems include significant amounts of information that can be used to analyze and monitor the performance of business processes in order to improve the efficiency. Traditional approaches for using workflow audit trail for decisio...
متن کاملFrom IHE Audit Trails to XES Event Logs Facilitating Process Mining
Recently Business Intelligence approaches like process mining are applied to the healthcare domain. The goal of process mining is to gain process knowledge, compliance and room for improvement by investigating recorded event data. Previous approaches focused on process discovery by event data from various specific systems. IHE, as a globally recognized basis for healthcare information systems, ...
متن کاملDiagnosing Advanced Persistent Threats: A Position Paper
When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...
متن کاملContinuous Fraud Detection in Enterprise Systems through Audit Trail Analysis
Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in en...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Research and Practice in Information Technology
دوره 34 شماره
صفحات -
تاریخ انتشار 2002