Jennifer Janson is the CIO of Mercy Hospital, a small hospital in rural Kentucky. After a two-year search, Janson has recently managed to hire a new medical director to replace the last doctor. Dr. Patterson knows that he has some leverage in this situation, so one of his first demands is to reduce the access controls required by him and the part-time physicians who help staff the hospital. He makes a convincing argument for the need to be nimble in responding to critically ill patients in this new world of electronic medical records. Janson consults with the IT manager, who functions as the information security officer for the hospital. Together, they decide to grant Dr. Patterson’s request, while mitigating this reduction in security controls by implementing a comprehensive and aggressive system logging, monitoring, and auditing program.
Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 2 page paper that covers the following:
Identify the events that can be captured by the operating system logs.
Describe how to monitor the activities of logged-on users.
Describe the role of monitoring in maintaining a security baseline.
Apply operating system audit and logging tools to meet the objectives of the auditing program.