EXERCISE
1. Discuss the purpose of a security audit, how it is managed and how to action the outcomes.
- It can be happen before the threats, the security have to be check first. It is security of an organization physical, financial and computer access that controls the procedures and systems to determine its level of vulnerability to attacks or intrusions from unauthorized access.
- It is managed by evaluating the scope of information security management organization and determine whether essential security functions are being addressed effectively.
- We have to update our security systems to prevent from unauthorized access.
2. Explore the range of vulnerability tests to detect weakness in security systems.
- Software program to discover flaws - to tests the system by sending out remote threats in order to ensure the system is capable of holding against security threats.
- Improves the speed of re-mediating highest risk vulnerabilities.
- Using host based to identifies the issues in the system.
- Vulnerability scanning - potential targets for DOS attacks.
- Password cracking - used to test and detect weak passwords that should be changed.
3. Provide an outline problem scenario for testing and review possible outcomes.
Problem: Abuse of User Account Privileges
Problem: Abuse of User Account Privileges
- Most attacks were carried out by insider. Whether t's because of honest mistakes (accidently sending info to the wrong email address or losing a work device), intentional leaks and misuse of account privileges, the people inside you business represent one of the biggest security problems you'll ever face because these threats come from trusted users and systems, they're also among the hardest to identify and stop.
4. Produce an audit document showing the range of tests on IT systems and networks (e.g. LANs/WANs and wireless networks).
REFERENCES
What is security audit? definition and meaning
BusinessDictionary.com. (2018). What is security audit? definition and meaning. [online] Available at: http://www.businessdictionary.com/definition/security-audit.html [Accessed 8 May 2018].
Information Security Management Audit/Assurance Program
Isaca.org. (2018). Information Security Management Audit/Assurance Program. [online] Available at: https://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Information-Security-Management-Audit-Assurance-Program.aspx [Accessed 8 May 2018].
Bhatti. (2012). Audit
Checklist for Information Systems. Slideshare.net. Retrieved 8
May 2018, from
https://www.slideshare.net/ATBHATTI/audit-checklist-for-information-systems-14849697
Bhatti. (2012). Audit Checklist for Information Systems. Slideshare.net. Retrieved 8 May 2018, from https://www.slideshare.net/ATBHATTI/audit-checklist-for-information-systems-14849697
computer repair nj Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info.
ReplyDelete