bilgiişlem denetim tarihçesi

listen to the pronunciation of bilgiişlem denetim tarihçesi
Турецкий язык - Английский Язык
(Bilgisayar) audit trail
A formal record or log of the financial transactions of an organization or system, especially such a computerized record
Chronological record of system activities or message routing that permits reconstruction and examination of a sequence of events
A step-by-step record by which financial data can be traced to its source
A record showing who has accessed a computer system and what operations they have performed during a defined period of time Audit trails are useful for maintaining security and for recovering lost transactions
A chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction from inception to final results [NCSC88]
The historic data and information which are available for examination in order to prove the correctness and integrity with which the agreed security procedures related to a key or transaction which allows breaches in security to be detectable
Manual or computerized tracing of the transactions affecting the contents or origin of a record Usually, an audit trail documents each time a record was accessed, who accessed it, and what changes, if any, were made
The process whereby a company's accounting system is audited, starting with the original transactions and ending with the set of financial statements which represent the company's financial position and performance during the period under review
In computer/network systems: Record of events (protocols, written documents, and other evidence) which can be used to trace the activities and usage of a system Such material is crucial when tracking down successful attacks/attackers, determining how the attacks happened, and being able to use this evidence in a court of law Authentication The process of establishing the validity of the user attempting to gain access to a system Primary authentication methods are
Information on the significant steps in the progress of a transaction which allows an auditor to determine that there are no errors in the reporting of the transaction In electronic commerce a good audit trail can help resolve programming errors and discrepancies in the how a transaction is recorded by the parties to the transaction
documentation that allows reconstruction of the course of events
A system or report that provides the transactions and background data that created a current status
A chronological record of system resource usage This includes user login, file access, and other activities, as well as whether any actual or attempted security violations occurred, either legitimate or unauthorized
A software tracking system used for data security An audit trail is attached to a file each time it is opened so an operator can trace who has accessed a file and when
A manual or computerized means for tracing the transactions affecting the contents of a record
The record of trading information identifying, for example, the brokers participating in each transaction, the firms clearing the trade, the terms and time of the trade, and, ultimately, and when applicable, the customers involved
Record of documentation describing actions taken, decisions made, and funds expended and earned on a project Used to reconstruct the project after the fact for lessons learned and other purposes
In computer security systems, a chronological record of system resource usage This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized
a chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to final results Sometimes specifically referred to as a security audit trail
bilgiişlem denetim tarihçesi
Избранное