Introduction to Information Security


Scope of IT Audit The scope of an IT audit often varies, but can involve any combination of the following



Download 1,39 Mb.
bet31/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   27   28   29   30   31   32   33   34   ...   44
Bog'liq
CSS

Scope of IT Audit

The scope of an IT audit often varies, but can involve any combination of the following:

  • Organizational— Examines the management control over IT and related programs, policies, and processes
  • Compliance— Pertains to ensuring that specific guidelines, laws, or requirements have been met
  • Application— Involves the applications that are strategic to the organization, for example those typically used by finance and operations
  • Technical— Examines the IT infrastructure and data communications

Questions to be asked

  • Are passwords difficult to crack?
  • Are there access control lists (ACLs) in place on network devices to control who has access to shared data?
  • Are there audit logs to record who accesses data?
  • Are the audit logs reviewed?
  • Are the security settings for operating systems in accordance with accepted industry security practices?
  • Have all unnecessary applications and computer services been eliminated for each system?
  • Are these operating systems and commercial applications patched to current levels?
  • How is backup media stored? Who has access to it? Is it up-to-date?
  • Is there a disaster recovery plan? Have the participants and stakeholders ever rehearsed the disaster recovery plan?
  • Are there adequate cryptographic tools in place to govern data encryption, and have these tools been properly configured?
  • Have custom-built applications been written with security in mind?
  • How have these custom applications been tested for security flaws?
  • How are configuration and code changes documented at every level? How are these records reviewed and who conducts the review?

IT Security audit program goals

• Provide an objective and independent review of an organization’s policies, information systems, and controls.

• Provide reasonable assurance that appropriate and effective IT controls are in place.


Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   ...   27   28   29   30   31   32   33   34   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish