In five pages this tutorial answers questions regarding IS uses in security and auditing areas. Two sources are listed in the bibliography.