ISSN: 1948-1432

Journal of Global Research in Computer Sciences
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article


S. K. Pandey1*, K. Mustafa2
  1. Department of Information Technology, Board of Studies the Institute of Chartered Accountants of India (Set up by an Act of Parliament), Noida- 201 309, INDIA [email protected]
  2. Department of Computer Science Jamia Millia Islamia (A Central University), New Delhi-110 025, INDIA [email protected]
Corresponding Author: E-mail: [email protected] , [email protected]
Related article at Pubmed, Scholar Google
To read the full article Peer-reviewed Article PDF image


In current digital era, business organizations are using Information and Communications Technologies (ICT) for better support of their goals. There is no doubt to say that every function of the business modules is either dependent or going to be reliant on IT related tools and techniques. This facilitates organizations on one side but at the same time, it has some big challenges also from the security perspective. Insecure software is already proving to be a threat to the financial, defense, energy, and other critical important applications, which are increasing risk in direct or indirect way. To overcome these issues, a variety of methodologies have been deployed for developing secure software, but, on the other hand, attackers are continuously exploiting vulnerabilities to compromise security. Research studies reveal that security cannot be added in developed software rather it should be introduced right from the beginning in the Software Development Life Cycle (SDLC). To achieve this objective, security measures must be embedded throughout the SDLC phases and starting from the requirements phase itself. ‘Event Log and Audit Trails’ is globally accepted as one of the prominent security requirements. Appropriate level of this requirement may well enforce security features and hence, ensure security for deployed software. The paper proposes a checklist, which may enable the assessment of the appropriateness of ‘Event Log and Audit Trails’ and lead to counter/additional measures for security assurance.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version