Preview

Unit 4

Powerful Essays
Open Document
Open Document
1878 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4
It 255
Hana Laplant
4/12/12
Unit 4
Assignment 1&2
Enhance an existing it security policy framework
Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2.
Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.
To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements.
Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit entries that an analyst would need to sift through to identify the narrow set of entries that warrant closer examination. This could cause delays or even prevent auditors from identifying suspicious activity. Thus, over-monitoring can leave an organization as vulnerable as monitoring too little.
New auditing features in Windows 7 and Windows Server 2008 R2 make it easier to audit important user, computer, and network activities in a focused, efficient manner. These features

You May Also Find These Documents Helpful

  • Powerful Essays

    One of the hottest topics in the Information security industry now is the Managed Security Services. Everyday, we keep hearing about different organizations proposing for managed security services, presenter 's preparing hundreds of slides on describing the functions, importance and benefits of managed security services. This report is an…

    • 5432 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Hunton, J. E. (2004). Core concepts of Information Technology auditing. In. (Ed), Conducting the IT audit (pp. 207-227). Retrieved from Retrieved from University of Phoenix eBook Collection Database…

    • 2536 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Audit Proposal - 1ç

    • 1626 Words
    • 7 Pages

    There are various types of audits available when it comes to examining accounting information systems. All audits should be able to evaluate obtained evidence which can determine if – for this instance, information systems – process are operating effectively and there is a strong comfort in the integrity of the data. Typically information systems audits are performed in conjunction with financial statement audits or internal audits, however, an examination may be performed whenever management/clients deem necessary.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Usage auditing: Verifies that systems and software are used appropriately and consistently with organizational policies. A usage audit may entail physically inspecting systems, verifying software configurations, and conducting other activities intended to prove that resources are being used appropriately. Periodically inspecting systems to ensure that software updates and patches are current and that only approved software is installed is a good idea.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Good Essays

    For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Auditing is about understanding requirements, looking for opportunities for improvement, looking for best practices, asking questions, gathering information, analyzing what’s seen and heard, forming opinions and reaching conclusions. This effort requires that auditors be prepared,…

    • 2142 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    Security paper

    • 1480 Words
    • 6 Pages

    Walt, C. v. (2010, Nov 03 ). Introduction to Security Policies, Part One: An Overview of…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    it control

    • 2296 Words
    • 10 Pages

    Controls for providing information security can be physical, technical, or administrative. These three categories of controls can be further classified as either preventive or detective. Preventive controls attempt to avoid the occurrence of unwanted events, whereas detective controls attempt to identify unwanted events after they have occurred. Preventive controls inhibit the free use of computing resources and therefore can be applied only to the degree that the users are willing to accept. Effective security awareness programs can help increase users’ level of tolerance for preventive controls by helping them understand how such controls enable them to trust their computing systems. Common detective controls include audit trails, intrusion detection methods, and checksums.…

    • 2296 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Honeypots

    • 1901 Words
    • 8 Pages

    Although there exist a number of security tools that are available today, none of these tools can easily address all of the security goals of an organization. As computer attacks evolve, new responses are essential. Thus organisations look for more advanced tools which are effective in detecting security attacks and recovering from them.…

    • 1901 Words
    • 8 Pages
    Good Essays
  • Best Essays

    In general, the objective and scope of an audit do not change when it is conducted using a computer. The objective is still to determine if the financial statements issued by the management of a business accurately and adequately conform to generally accepted accounting principles, thereby presenting a true picture of the economic reality of the business. The concept of CAAT also is not new in the audit field. It implies the utilization of information technology resources in the auditing procedures to achieve its desired…

    • 3171 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    “Information Security Management: Not A Technology Problem”. 2001. Building Comprehensive Information Security Programs. White Paper.…

    • 2534 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    System Audit

    • 12719 Words
    • 51 Pages

    An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization 's information systems, practices, and operations. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively and efficiently to achieve the organization 's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.…

    • 12719 Words
    • 51 Pages
    Powerful Essays
  • Good Essays

    * Employee Monitoring similarly monitors and records all instant messages, including usernames and passwords, and the conversations from both participants. Employee Monitoring performs equally well for email as well. Employee Monitoring targets time usage inefficiencies, spots activities which are against policy prior to their becoming crises, and tracks spyware and hack attempts on the network, all at much more reasonable costs than other solutions.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information System

    • 1514 Words
    • 7 Pages

    1.4.4 Information Systems for the Banking & Financial Sector: Audit is one of the major controls for monitoring management activities in the banks and financial institutions. In a computerized environment, IS audit is a very effective and necessary activity. Usually the IT implementation in the banking and financial organizations is done by adopting a mix of different methodologies – internal development and deployment and third party product development and deployment. In case of internally developed and deployed IT systems, IS audit will require to be done by a team of specially trained internal or external auditors. However, it is preferable to have the IS audit conducted with the help of suitable external agencies with the required skills and expertise to ensure independent nature of audit.…

    • 1514 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    principle of auditing

    • 3509 Words
    • 15 Pages

    Auditing is defined as a systematic and independent examination of data, statements, records, operations and performances of an enterprise for a stated purpose. The auditor perceives and recognizes the propositions before him for examination, collects evidence, evaluates the same and on this basis formulates his judgment…

    • 3509 Words
    • 15 Pages
    Best Essays