audit trail

listen to the pronunciation of audit trail
Englisch - Türkisch
(Bilgisayar) bilgiişlem denetim tarihçesi
(Bilgisayar) denetim tarihçesi
denetleme yolu
denetleme tarihçesi
denetim izi
(Hukuk) muhasebe hesapları
security audit trail
guvenlik denetimi izi
Englisch - Englisch
A formal record or log of the financial transactions of an organization or system, especially such a computerized record
Chronological record of system activities or message routing that permits reconstruction and examination of a sequence of events
A step-by-step record by which financial data can be traced to its source
A record showing who has accessed a computer system and what operations they have performed during a defined period of time Audit trails are useful for maintaining security and for recovering lost transactions
A chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction from inception to final results [NCSC88]
The historic data and information which are available for examination in order to prove the correctness and integrity with which the agreed security procedures related to a key or transaction which allows breaches in security to be detectable
Manual or computerized tracing of the transactions affecting the contents or origin of a record Usually, an audit trail documents each time a record was accessed, who accessed it, and what changes, if any, were made
The process whereby a company's accounting system is audited, starting with the original transactions and ending with the set of financial statements which represent the company's financial position and performance during the period under review
In computer/network systems: Record of events (protocols, written documents, and other evidence) which can be used to trace the activities and usage of a system Such material is crucial when tracking down successful attacks/attackers, determining how the attacks happened, and being able to use this evidence in a court of law Authentication The process of establishing the validity of the user attempting to gain access to a system Primary authentication methods are
Information on the significant steps in the progress of a transaction which allows an auditor to determine that there are no errors in the reporting of the transaction In electronic commerce a good audit trail can help resolve programming errors and discrepancies in the how a transaction is recorded by the parties to the transaction
documentation that allows reconstruction of the course of events
A chronological record of system resource usage This includes user login, file access, and other activities, as well as whether any actual or attempted security violations occurred, either legitimate or unauthorized
A software tracking system used for data security An audit trail is attached to a file each time it is opened so an operator can trace who has accessed a file and when
A manual or computerized means for tracing the transactions affecting the contents of a record
The record of trading information identifying, for example, the brokers participating in each transaction, the firms clearing the trade, the terms and time of the trade, and, ultimately, and when applicable, the customers involved
Record of documentation describing actions taken, decisions made, and funds expended and earned on a project Used to reconstruct the project after the fact for lessons learned and other purposes
In computer security systems, a chronological record of system resource usage This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized
a chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to final results Sometimes specifically referred to as a security audit trail
In the context of sensemaking, a representation of the set of layered sources, assumptions, and annotations related to a conclusion See accountability in sensemaking
Manual or computerized tracing of the transactions affecting the contents or origin of a record
In computer security systems, a chronological record of system resource usage This includes user login, file access, security violations occurred, legitimate or unauthorized
manual or computerized recording of transactions affecting the contents or origin of a record
The record of trading information identifying for example, the brokers participating in each transaction, the firms clearing the trade, the terms and time of the trade, and, ultimately and when applicable, the customers involved
A file or database that contains a list of changes made to a specific file The information includes the name of the file, the date and time of the change, the person making the change, and the text of the change itself
Record of transaction in an information system Audit trails enable a user to identify and verify the activity of an information system In TUFIMS, audit trails are the detailed records of transactions at various stages used to trace a source document through final processing and/or to verify the accuracy of the information entered or altered In effect, the primary function of TUFIMS is to provide audit trails
(Ticaret) A system or report that provides the transactions and background data that created a current status
audit trails
plural form of audit trail
audit trail

    Silbentrennung

    au·dit trail

    Türkische aussprache

    ôdît treyl

    Aussprache

    /ˈôdət ˈtrāl/ /ˈɔːdɪt ˈtreɪl/
Favoriten