Course Hero Logo

Security Audit.pptx - Security Audits April 4, 2017...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 6 out of 14 pages.

Security AuditsApril 4, 2017
IntroductionFocus on Security Audit topicsIdentification of security related risks/threatsAdequacy of security policies and security awareness trainingHandling of ethical issues, including security-related legal/regulatorycompliance (non-privacy related), intellectual property and licensingCompliance with privacy related laws and regulationsDiscuss the evaluation of the tools and methods used to mitigate any security risk,threats or policies as well as the tools and methods used to perform the review steps.Criteria/measures that you will use to evaluate the adequacy of each area/review stepthat you review
Security Related Risk & ThreatsMalwareOutdated Security SoftwareSocial EngineeringCyber-Security CrimesHuman Error/ThreatFalsified information compromises performance
Why security related risk arecritical?Area: Security Risk & ThreatsPotential Risk to be Reviewed: Malware and Outdated Security SoftwareMalware can introduce unwanted security threats that can damage a network or any organizationinformation.Outdated Security Software impacts the integrity and vulnerability of all IT Business needs. Data,Security, Mobile Computing , etc. now becomes at risk.Evaluation of Tools and Methods:Regularly train staff on common types of malware and how to avoid themWhen security patches become available for operating systems and office programs, such as Windowsand Microsoft Office, install them immediately. Again, enable automatic updates.Reports: Prepare detailed report of Security Testing which contains Vulnerabilities and Threatscontained, detailing risks, and still open issues etc.
Security Related Risk/ThreatsEvaluation of Tools and Methods:

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags
Ethics, security awareness training, security policies

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture