Although security features are implemented by
the security administrator as requirements for all users, this chapter
has described ways in which you can contribute to system security.
The following list reviews voluntary security actions:
Check your last login
messages each time you log in, and report any unexplained messages
to your security administrator (“Reading Informational Messages”).
Lock up backup media.
Anyone who has the media in hand can access the information that is
stored on the tape or disk.
Ask your security administrator
to enable security auditing for any protected objects, such as files,
that you suspect have been accessed improperly (“Auditing File Access”).