Question

Reasons why a security audit is necessary with your recommendations for conducting such an audit Please...

Reasons why a security audit is necessary with your recommendations for conducting such an audit

Please include the following: -Potential costs (personnel, finances, etc.) -Proposed audit timeline -Two recommend methodologies (Audit)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

SECURITY AUDIT :

Every company has some set of established, functioning and well organized rules and regulations. A security audit is conducted in regular intervals or scheduled timelines to ensure that the company or organization runs based on the designated rules and regulations. A security audit is not conducted limiting to the hardware of the company alone but also the software, employees and every resource that is said to belong to the company.

Security audits are conducted to asses vulnerabilities in the core of the organization so as to avoid data theft or loss, intentionally and accidentally, by means of performance testing, financial record verification and diagnosis of the entire information branch.

TYPES OF TASKS PERFORMED DURING SECURITY AUDIT :

Ethical hacking techniques are used to mitigate or check the strength of the network when there is an internal or external attack from a malicious hacker.

The personnel involved in a security audit may call the employees of an organization with false promises of goodies to check if any critical or vital information will be given out by the employee.

They transmit various files of dummy data over the internet and try to intercept it, mimicking the moments of a hacker to check the strength of end to end encryption techniques.

They check the strength and agility of the backup storage in order to assess the speed of gaining back data after an attack.

They try to access various vital and restricted access entry or exit points to check the level of ease with which an outsider can enter.

POTENTIAL COSTS INVOLVED IN A SECURITY AUDIT :

The costs involved in a security audit differ basing on multiple factors like the complexity of the network, the ability of existing environment to withstand hostile attacks, the robustness of the network, the economic strength of the organization as a whole, the type of security check - whether it is a thorough check or just an analysis of recorded observations, etc. Real time examples show us that the security audit for a small scale company to a large scale organization can range between many thousands to a few million rupees. The security audit might require a lot of man power because it has to involve thorough examination of the network and company infrastructure, by the personnel belonging to the security audit team and also each and every individual of the organization.  

PROPOSED SECURITY AUDIT TIMELINE :

An audit is said to be effective if it is conducted on a monthly basis, with checks for a robust network, restricted access to entry and exit guarding vital information, loyalty of the employees of the organization so that they do not give out crucial data to external malicious sources. A regular and deep analysis of existing financial records by a team of expert security auditors is highly suggested.

Add a comment
Know the answer?
Add Answer to:
Reasons why a security audit is necessary with your recommendations for conducting such an audit Please...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Reasons for why a security audit is necessary with your recommendations for conducting such an au...

    Reasons for why a security audit is necessary with your recommendations for conducting such an audit: -Potential costs (personnel, finances, etc.) -Proposed audit timeline -Two recommend methodologies (Audit)

  • DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program...

    DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...

  • Information security is everyone’s business and needs to be made a top organizational priority. Firms suffering...

    Information security is everyone’s business and needs to be made a top organizational priority. Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more. Information security isn’t just a technology problem; a host of personnel, operational and procedural factors can create and amplify a firm’s vulnerability. Please get into groups of 2-3 students for this assignment and answer the following questions. Search online for a...

  • Discuss some of the biological reasons why psychoactive drugs may be so compelling to the user,...

    Discuss some of the biological reasons why psychoactive drugs may be so compelling to the user, and why cessation of use (quitting) may be so difficult. Influences you might address include addiction, neuroadaptation, tolerance, permanent or relatively permanent changes in the brain/body, etc. Feel free to use sources/evidence to support your point including examples, scholarly articles or videos, your textbook, personal experience, etc. Please post your initial response by the end of our in-person class time to allow others time...

  • What was the indication for your patient’s C-section? Please explain why it was necessary for them...

    What was the indication for your patient’s C-section? Please explain why it was necessary for them to have a C-section over a vaginal delivery. The five conditions listed below are common reasons for a C-section. Define the following conditions; discuss the significance, risks and why a cesarean section is indicated in these instances: Shoulder Dystocia: Prolapsed umbilical cord: Placenta previa: Placenta abruption: Fetal Malpresentation: For each of the following periods listed below, describe the standard orders, policies and practices related...

  • explain why please A parallel-plate capacitor is made of two conducting plates of area A separated...

    explain why please A parallel-plate capacitor is made of two conducting plates of area A separated by a distance d. The capacitor carries a charge Q and is initially connected to a battery that maintains a constant potential difference between the plates. The battery is then disconnected from the plates and the separation between the plates is doubled. ) Which of the following remains constant? Voltage across the capacitor Capacitance of the capacitor Charge on the capacitor Submit (Survey Question)...

  • Data Management, in your own words please describe in two paragraphs why it is important to have good security measures...

    Data Management, in your own words please describe in two paragraphs why it is important to have good security measures to store your data

  • Revenue Cycle" Please respond to the following: From the e-Activity, examine the steps necessary to complete...

    Revenue Cycle" Please respond to the following: From the e-Activity, examine the steps necessary to complete a sale and discuss how the sales order process is integrated with other processes (credit and collections, delivery, etc.). Indicate your overall satisfaction with the process. From the e-Activity, recommend at least one improvement in the Website’s sales order process you would implement to make it more efficient in order to improve the customer experience. Then, assess whether the recommendation meant to benefits the...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • "New Ventures and Opportunities" Please respond to the following: Identify three (3) reasons why individuals create...

    "New Ventures and Opportunities" Please respond to the following: Identify three (3) reasons why individuals create new business ventures. Next discuss any goals or motives that would drive you to become an entrepreneur. Provide examples for your response. Discuss at least (3) fundamental drivers for establishing a new venture then share two (2) common sources that provide the ideas for these business opportunities. Be sure to support your response.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT