Companies need to protect their internal resources. Protection is often done by restricting access to files and folders using access control lists. An administrator can restrict access to files and configure auditing to log any attempted breaches. Find something that interests you from one of the following links or a similar link on this topic and create a thread discussing why you find that section or topic interesting. Each learner is responsible for one posting, and that posting should be its thread to keep the forum clean and manageable. Audit Report on User Access Controls at the Department of FinanceLinks to an external site.: an audit report on user access controls at the finance department for the city of New York. Canadian Audit of System Access ControlsLinks to an external site.: a more recent audit of system access controls for Canada's citizenship and immigration unit. TechTarget article on IT Security auditing best practicesLinks to an external site.: an article by Carole Fennelly in TechTarget on IT security auditing best practices. The intent of this exercise is that discussions begin and continue, with students providing thoughtful insights, reflections, and engaging responses. Remember your Netiquette. Additionally, remember that you must support your post with a reference, so be sure to capture the specific source of the information you use to support your post..