Wednesday, October 16, 2019
Access and Event Management Essay Example | Topics and Well Written Essays - 2500 words
Access and Event Management - Essay Example Security measures imposed on information systems restrict unauthorized external access. Every access, function, or activity is documented. This information is stored in event logs. These logs are required by the law and also help the organization eliminate certain risks. The documentation provides a framework for easy restoration of systems when they fail. The organization can also use them as evidence against unauthorized access to the systems. ITIL is an automation infrastructure for information exchange and process management. Organizations can share information through this infrastructure. Access management refers to authorization of humans and privileges to a system within or across enterprise boundaries. Business organizations have information that requires protection against unauthorized access. Organizations set up policies that govern those who access information, and what levels they can access. For example, managers can access salary information about subordinate workers, but cannot access that of the chief executive. Companies and executives can grant access to external users for information about the organization. This access is important for knowledge sharing and managing available resources. Every access to information is documented in event logs. These logs keep records of all activities in the information systems. Failures are also documented and used by the system administrators to restore the system. Event logs are stored in servers, computers, and routers. Access management deals with authorization and authentication procedures set up by an organization. Event management is the way an organization keeps records of events regarding the information system. Automation refers to activities that take place without human intervention. The path taken by events from the source to the destination is called event flow. A file containing a list of events that have occurred is called an event log. These logs are stored in a log server or a computer. ITI L is an IT service management infrastructure. It
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.