Exploration and Implementation of Computer System Data Security Management System
Abstract
Most system security policies for computers are written relatively loosely. This is designed in many respects to provide easy access to all the features of the computer network. However, without the need to access many of the network features, so much leeway gives users the ability to perform functions that might damage the infrastructure or have access to information they do not necessary to look at. The intrusion prevention mechanisms, firewalls, and other protective equipment ensure the secure functioning of the system, but inside increasingly widespread use of networks, malware, hackers as well as extra safety accidents, these safety measures devices can deliver tens of thousands of alerts in a very small time, rendering it impossible for network management staff to locate valuable information. With this in mind, this paper deals with a look at computer system security. This paper deals with computer misuse and detection, and the exploration and application of a control of safety system. Detection of misuse includes at least two elements. Audit elimination and profiling capacity are these. Huge files can be set up when audit functions are allowed in the operating system. The automatic audit features can easily search audit files by setting staff user profiles, checking for usage that falls below what is determined to be usual, alerting administrators, and removing old audit data.