Programs {auditing} can record who changed database data, when, and why, as shown in audit logs.
Users have identification and authentication information, plus information about what user can access {keychain}.
Users can have permission to execute specific functions {profile, computer}.
Users do not update system data {static data}, such as instrument locations, entered by administrator at system setup or upgrade.
3-Computer Science-Software-Security
Outline of Knowledge Database Home Page
Description of Outline of Knowledge Database
Date Modified: 2022.0225