to prevent tampering or deleting from internal and external unauthorized users. This type of data includes system logs, logs associated with firewall, FTP, World wide web, and anti-virus software, system audit records, network traffic monitoring, the appropriate operating system (like the Home windows operating-system) and also the hidden files or temporary files of databases, database operation records, hard disk swap, slack data and free buffers, software configuration data script…
Words 2006 - Pages 9