Integrating Security" Information Assurance is a way of assessing the usefulness and effectiveness of a system’s security. Please define the goals of an access control monitoring system. Describe the types of checks and balances that should be implemented into a network’s design to ensure that access control is being maintained. Describe what information can be obtained from the unauthorized access attempts audit logs. Explain the best practices for log archival. Additional post options: How can automated systems help with monitoring access control? ...