Discussion: Integrating Security
Information Assurance is a way of assessing the usefulness and effectiveness of a system's security.
Define the goals of an access control monitoring system. Describe the types of checks and balances that should be implemented into a network's design to ensure that access control is being maintained. Describe what information can be obtained from the unauthorized access attempts audit logs. Explain the best practices for log archival.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.