A security audit verifies compliance and a security assessment validates vulnera
ID: 3737562 • Letter: A
Question
A security audit verifies compliance and a security assessment validates vulnerabilities. An organization should employ both to capture complete perspective of the overall security stance. A company should know where violations happen or vulnerabilities exist in their own networks. Auditing system policies and assessing system security require certain procedures in a specific order.
1.Assume that you are a member of the auditors’ team, and you have been asked to prepare a list of what the auditors would audit.
2.Now assume that you are one of the IT organization’s members. Discuss how they would prepare themselves for an audit
Explanation / Answer
1.Assume that you are a member of the auditors’ team, and you have been asked to prepare a list of what the auditors would audit.
Answer)
A security audit verifies the security and working and process of the organization and also correct it using the auditing process. The audit maybe external or internal depending on the audit type and requirements. During an audit the company should know where violations happen or vulnerabilities exist in their own networks. As a member of the audit team, we have many things that auditors would audit such as:
Architecture Review of the system and the security
Business process and loopholes existing in the process
End user management and confidentiality
Security of the application or systems and working
Database controls and database security
Integrity controls
Loggers and recording the auditing systems and process
Network protection and controls for the system
2.Now assume that you are one of the IT organization’s members. Discuss how they would prepare themselves for an audit
Answer)
When you're among the IT organization’s team whose audit is going to happen. Make sure you take in consideration several things that re going to make for a good audit score and some of the things to follow are:
The definitions and documentation of the system applications and processes which are in place
The areas of improvement identified by team and implemented
Areas of improvement identified by team which will be implemented shortly
The entire business process should be clear for the team and you should be prepared for that
Clear ideas of how do the system handles security issues such as database and network and how the process is implemented
How the administrator or the owner of the system takes control in a fail-safe situation
Defend your position that the system is working as it should in real life and activities to improve that is ongoing every day
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.