Back to Search Start Over

On Auditing Audit Trails.

Authors :
Mercuri, Rebecca T.
Source :
Communications of the ACM. Jan2003, Vol. 46 Issue 1, p17-20. 4p.
Publication Year :
2003

Abstract

The current auditing crisis of big business can provide useful lessons and suggestions for improving similar practices within the computer industry. Audit trails, whether computer-based or manually produced, typically form a significant part of the front-line defense for fraud detection and prevention within systems. Many of the security practices revolve around the generation and preservation of authenticated data streams that are to be perused routinely or periodically, as well as in the event of system attack, failure, or other investigations. But these audit trail systems are not necessarily robust, since components can be subverted or ignored. Furthermore, it is the surrounding controls or overriding design-and-use philosophies, that are often discovered to be inadequate or circumvented. Audit trails, whether computer-based or manually produced, typically form a significant part of the front-line defense for fraud detection and prevention within systems. It is incumbent upon us to examine our own auditing practices for their intrinsic vulnerabilities.

Details

Language :
English
ISSN :
00010782
Volume :
46
Issue :
1
Database :
Academic Search Index
Journal :
Communications of the ACM
Publication Type :
Periodical
Accession number :
12514005
Full Text :
https://doi.org/10.1145/602421.602436