Although security features are implemented by the security
administrator as requirements for all users, this chapter has described
ways in which you can contribute to system security. The following
list reviews voluntary security actions:
Check your last login messages each time you log
in, and report any unexplained messages to your security administrator
(
Reading Informational Messages).
Lock up backup media. Anyone who has the media in
hand can access the information that is stored on the tape or disk.
Ask your security administrator to enable security
auditing for any protected objects, such as files, that you suspect
have been accessed improperly (
Auditing File Access).