Although security features are implemented by the securityadministrator as requirements for all users, this chapter has describedways in which you can contribute to system security. The followinglist reviews voluntary security actions:
Check your last login messages each time you login, and report any unexplained messages to your security administrator(Reading Informational Messages).
Lock up backup media. Anyone who has the media inhand can access the information that is stored on the tape or disk.
Ask your security administrator to enable securityauditing for any protected objects, such as files, that you suspecthave been accessed improperly (Auditing File Access).