AUDIT INFORMATION CONTENT
|
|
|
- Raymond Wilkinson
- 10 years ago
- Views:
Transcription
1 AUDIT INFORMATION CONTENT Ioan Rus 1 ABSTRACT: The audit of computer systems shows at least two features that make the audit work not includable in other audit processes such as internal audit and financial audit. These two particularities refer to the specific software used in information systems auditing and real levels of information systems audit. This paper presents the specific levels of a system of auditing and specific techniques available for their implementation in practice. In the end the author suggests proposals for improving specific audit performances in the area of informatics systems. Key words: Internal audit, Information audit, specific levels of the information audit, operation systems, data centres, data bases, standards for the information audit, CISA certifications, CISM certifications. JEL Codes: C810, C820, K400, D800, M420, L860, O510 Introduction Information Audit is a particular form of audit which verifies if an Information System achieves the purpose for which it has been developed. The Information System Auditor is represented by a computer scientist specialized in economic informatics and in the financeaccounting field. He is certified as a computer auditor (Certified Information Systems Auditor, CISA) by ISACA (( /Pages/default.aspx) in accordance with conditions set by the Chamber of Financial Auditors of Romania. Globally, the Information Systems Audit and Control Association, - ISACA is the best known authority in auditing, control and security management systems (Renard, 2003). Regardless of the ideas and trends existing in the literature (Eden and Stanciu, 2004), we conclude that in practice the auditing of computer systems is formal, made within irrelevant levels and with inappropriate tools. The description of the process of audit information, of computer components that need to be audited, of the techniques specific to audit information and their respective resources, represent the main objectives of this work (Dănescu, 2007). Research activity The overall objective of the research is to describe and analyze the content, components and computer audit activities. We sought to describe the activities of audit information, to present the role of auditing and how audit information of each specific activity, to illustrate how to audit a information system component using appropriate software programs and to identify specific audit information. We also sought to demonstrate that the methods and tools specific audit information. Research aims to identify issues audit information and verify the hypothesis that audit information is a specific audit. Audit information can t be included and performed with technical means of other types of audit. To verify this hypothesis the research I did so: we defined information content of audit work, we described the activities and processes to be audited, we described how to do audit these processes and practically exemplified auditing a computer system using Windows operation system from a computer network. I made a presentation of views in the literature in the field. In particular we sought ideas American professor Chris Davis and his collaborators on the definition and practical issues related theoretical IT audit (Davis, Schiller, et al., 2011). In contrast to these descriptions we analyzed the 1 Petru Maior University, Târgu Mureş, Romania, [email protected] 119
2 ideas of his "Theory and Practice of Internal Auditing" of specialist Jacques Renard, conducted by the Ministry of Finance in Romania (Renard, 2003). Research findings are included in the following paragraphs of this study. Description of current state of knowledge The internal audit is regulated by Law 672/2002 concerning public internal audit and Law 31/1990 regarding trading companies, the internal audit domain includes also information systems. Law 31/1990 regulations do not include provisions regarding information systems audit. Out of the corroboration of these two regulations there can be understood, by means of deduction, that the obligations relative to the internal audit must be accomplished according to Law 672/2002 provisions; these ones regulated the auditing activity as specific law. None of the laws do not make mention of the obligations and responsibilities of the Information Systems Audit and Control Association - ISACA, the Romanian filial. Moreover, the legal provisions are not compulsory for private organizations; for public organizations they have working environments within which they can be hardly of formally applied (Rus, Dănescu, 2010). The audit process of IT systems I am identified three elements of the information audit: the activity content of IT audit; the audit components; techniques and tools used to audit information systems. The activity content of IT audit Computer audit work includes audits of all major components of a computer system and other processes of the computer system components. In determining the content and conduct of the audit work it is necessary to define the main objective of computer audit and then the main steps of the practical work of the audit team. In general, the computer s audit main objective is to establish and verify that the systems perform their designated duties, as well as the risks for their operation. The stages of development of the IT audit process are relatively similar to those of any audit process. These steps are: 1. audit activities planning; 2. documentation on site; 3. identifying problems; 4. determining solutions to the identified problems; 5. preparing the audit report; 6. elaborating a monitoring graph for tracking identified problems solving. Computer audit is an independent component of the audit because it audits functioning components of a technical system, which is the computer system, audited with specific techniques and dedicated professionals. According with U.S. standards, the most important information processes which are audited are the following: a) the system's internal controls; b) control over changing software components; c) control over system safety and recovery in natural or informational disasters; d) control over the execution of algorithms according to system design specifications. Audit components All the components that determine the safe, fair and efficient functioning of the information system are audited. The audit components should address the following processes (Davis, Schiller, et al., 2011): 120
3 a) global auditing controls in the organization; b) Data Centres audit and disaster recovery techniques; c) Audit for filtering devices of information communications: Internet servers, switches, routers, bridges and Firewalls sites; d) auditing operating systems (Windows operating systems auditing separately, Unix, Linux and web servers); e) audit of Databases; f) auditing Applications; g) auditing wireless networks (WLAN) and mobile devices. The auditing of computer components is done following specific objectives for each of them and using appropriate audit techniques. Next I will review the audit techniques used for each of the above components. Global auditing controls across the organization The specific objective is to check how the development plans of informatics systems are in accordance with the strategic plans of business processes within the organization. The activities to be checked at a global level refer to: checking the structure of computer business in accordance with the approved structures at the managerial level; identifying performance indicators that measure computer activity; the correlation between system functioning and existing regulations for each informatics process; the possibility and restrictions for the people which are not employees and access the computer system for various controls; the existence of licenses for the computer components used; the remote access to the computer network check; the computer system configuration type for the replacement of components or change of the rules for system management so as it does not cause unnecessary disruption; the mechanism for transportation or labelling of data supports or carries for dispatching from one place to another; the clarity and application of procedures for computer devices acquisition. Auditing Data Centres and disaster recovery techniques The specific objective is to check the security level implemented on all activities taking place within the data centre. Security is the most important objective in a data centre because this is the most important data of an organization. The activities audited are: the access of persons in the data centre; alarm systems and their operation; the provision of electricity in case of power failure; the confidentiality measures for the existence and access inside the data centre; the directives, measures, actions and insurances for data centre operation in case of natural disasters, fires or attacks. Within the Data Centre one should also check: personnel monitoring facilities; rules and responsibilities of individual staff; the responsible in case of emergencies and disaster; protection and data replication techniques; the existence of data replication functional equipment; the rescue storage and duplication of data techniques; the emergency plan and procedures for data recovery in case of emergency, disaster, fire, attacks, etc. Auditing of computer communications filtering devices Benchmark audit aims to identify computer networks traffic control rules and information so that only authorized persons have access to available data. To achieve this objective the audit is carried out by using the following activities: identifying the specific network configuration of the informatics network for all equipment used; conformity checks for critical access points of the computer network, in this order: bridges, routers, switches and access filters. The audit of this process includes specific checks of all computer network equipment. For example, checking that all network services which are not needed are disabled; whether the software component of the informatics network management (e.g. SNMP - Simple Network Management Protocol) is a list of 121
4 user access control or access to a strong network resource control procedures are defined by roles users type authentication, authorization and user's control. At the level of network equipment some equipment (bridges, routers, switches, etc.) control or filter user access by using encrypted passwords. It is very important, for example, that their network routers do not send out the physical id of the network computer. In order to do this, in the configuration file of the equipment it must be checked that the following commands are included: no IP source-route and no IP directedbroadcast. There are lots of possibilities to manage users and secure passwords, by using encryption or the restriction of traffic on the network. The auditing of the computer network is done on 4 levels: a) general network level - where all hardware and software of the computer network is audited; b) the routers and bridges - auditing if all transfers of network flows are controlled and if dispatching is disabled for IP addresses on the network, but especially outside the network; c) level switches - to audit how to configure and manage virtual networks, including user control and data flows within virtual networks; d) Firewalls - checking that all controls are on hold and external attacks on all internal and external IP addresses are filtered accordingly. Operating systems auditing The specific objective of the operating system audit is to check how operating systems meet the required processing of applications, such as managed accounts and how user access to the system is controlled. Because operating systems are the most important within computer software packages, their differences between them are so great that each operating system has its own auditing techniques and components. We can identify separate methods and techniques for: auditing Windows-based operating systems that function as servers, operating systems auditing that works as Windows-based workstations in a network (Clients)-like operating systems auditing Unix / Linux and auditing operating systems Web-based servers that provide access to the Internet. In the following I will present only some of the specific audit activities of these operating systems. Auditing of Windows server operating systems - includes: information about the services installed, applications and drivers used; the list of programs that start automatically at start-up; the security of the system when using direct execution command ( RUN type), bypassing the operating system interface; determining the level of protection of the company by using Firewalls; the analysis of system protection resulting from password protection configuration; the control of users and programs accessing the operating system; the operation and recovery in case of disaster for the operating system. Auditing of Windows operating systems client, includes: determining the degree of protection by Firewalls; determining the types of antivirus programs and the degree of protection which they provide; verification of the conditions that the operating system service packs have recommended and regular updates. Software package Microsoft Baseline Security Analyzer (MBSA) deals largely auditing problems of working as a computer workstation (Client). Auditing of Unix/Linux operating systems server, includes: user and access passwords management; auditing control files and file security controls; audit of security and control processes for the computer network; 122
5 control of privileged user access ban by logging directly into the operating system; security checks so that all users will connect to the automatic control system connection information; ensuring that all users connected to the system are monitored; operation system security auditing to eliminate the risk of entering the system users, programs, data inconsistent without the standards of the operating system control. Auditing Web-servers - includes: auditing web platform, which refers to operating system security and physical protection of the server and computer network; Web server auditing, including basic configuration analysis, used the default settings; auditing of Web server applications, which include specific checks accessing pages on the Internet. For example operating system must support at least the standard HTTP, HTTPS, TCP / IP, FTP, SMTP, POP3 and SSL in order to implement basic services on the Internet. Database Auditing The specific objective of the audit of databases is that the data are correct and securely stored ( The database auditing activities are: operating system security database servers, applications and communication; access audit roles complexity: passwords, users and access rights; independence audit for the database system from the types of operating systems running on computers of "client"; how the audit system Database Management monitors all activities that occur on the database; auditing the encryption techniques used on the database; auditing processes to ensure integrity, vulnerability and source processes. Auditing applications The specific objective of the audit of applications is to secure their proper functioning. Application auditing activities are (Davis, Schiller, et al., 2011): the auditing and control inputs as input or user interface work; the auditing of transactions, which seeks to ensure that all operations on the database are executed correctly. Audit Management System seeks to ensure that the database is able to solve any situation that would lead to conducting operations on the database; the audit of user access to the applications. This function checks if all levels of protection and user access control are implemented, as follows: at the level of access to the computer network, the operating system level, applications level, the data used and programmed level; the auditing of techniques, methods and procedures for application software modification control, including risks arising from them; the audit of data protection methods and techniques for their recovery in case of incident or disaster. Auditing wireless networks (WLAN) and mobile equipment The audit of wireless networks (WLAN) and mobile equipment s main objective is to check how to protect computer system from outside attacks. A wireless computer network (WIFI) has two distinct components: one with equipment connected by direct physical carriers and another with equipment connected via wireless communication devices. The auditing of component equipment 123
6 connected by direct physical support is just as common to all computer networks. For the network that connects wireless devices the auditor should know and follow their specificity. Any wireless user connects to a computer network using two components: the communications equipment: computer, phone, tablets, smartphones, etc., and computer network access point that is a physical network device capable of wireless communication over: computer equipped with wireless Internet service provider or telecommunications operator. The auditing of wireless networks includes the following activities: technical auditing of wireless connections, which means checking their individual users requiring network connectivity; auditing tools and techniques used for accepting a user network connection; the audit of mobile equipment requiring network access. In this situation we must have more sophisticated SOFTWARE means to identify the work and safety protocols for applicant identification. In this case the applicant's personality should be monitored, also that of the connecting mobile equipment, of the machine owner, the equipment manufacturer and user accounts associated with the respective user. Techniques and tools used to audit information systems The entire information systems audit work is performed with specific equipment and especially with dedicated software for auditing various activities, functions and system equipment components. Their detailed presentation requires more specific knowledge of each product use program. For example I will present only the product MBSA (Microsoft Baseline Security Analyzer) for auditing on a Windows station client ( detailsaspx?id=7558). Program highlights for a computer or a computer network administrator errors that can cause instability in the operation system. MBSA in terms of audit work carried out following checks: the danger level of existing passwords; the hazard level and the file management system (NTFS); the file management system used and the danger presented for each drive; the analysis and control of user access to the operating system: if no password is allowed auto-start, if allowed to connect to your computer with password visitor, if allowed to use a generic password as anonymous. Figure 1 illustrates the MBSA (Microsoft Baseline Security Analyzer) start program execution. Figure no. 1 The MBSA the start program execution. 124
7 After analyzing a computer from the network, the complete results are obtained for the full audit of the Windows client station USER-PC workgroup network group. Fig. no. 2 presents an extract from the analysis result where we can observe the greatest vulnerabilities found, for example, Windows has 5 updates missing and did not installed a service pack, Office software package has 8 updates missing and three Service Packs not installed, so. Figure no. 2 MBSA - The Problems identified in the computer system security If you want to see the detailed content of their errors or missing components give a simple click on the report and see the mores details of the problems identified as nonconformities that irregularities and their degree of hazard, critical or important (see fig.no. 3). Based on these reports automatically obtained the auditor prepare audit report stating the situation and propose appropriate measures to remedy dangerous situations or shortcomings. Figure no. 3 MBSA- Detailed description of the shortcomings found in Office software package 125
8 We need to know that the audit program suggests solutions to problems identified, as shown in fig. 4. Figure no. 4 MBSA ways to solve problems according to the type and degree of risk This example shows that globally, for auditing computer systems many steps forward have been taken and that there is software that makes it easier for auditing information. As seen from the above example in the delivery of audit software there is still room for improvement. Conclusions This paper brings to the attention of economists and computer specialists computer the issue of informatics auditing by providing detailed audit objectives, IT activities to be audited and techniques used in auditing information systems. After their description, the possibilities for implementation are presented for the audit of informatics systems. As resulted from the practical study presented, informatics products for auditing purposes are still emerging and there is need to integrate them within software systems for auditing informatics systems. The brief example of auditing a Windows computer running as a network client computer practically demonstrates the need for this work to be done by economic informatics specialists. I emphasize that because the correct interpretation of results and retention of necessary measures according to their gravity can only be done by people who understand the operation of an information system's complexity. I want to emphasize that the use of over-specialized people such as programmers, or of some too little specialized, such as economists, could lead to the misinterpretation of findings, especially for the audit of operations systems, databases and wireless networks. From the description, above, the activities to audit and audit software means that information systems used is a specific audit activities and techniques that do not occur in other types of audit. The conclusion of this work is that informatics audit represents a specific audit and not be confused or substituted by internal audit or financial audit. 126
9 References 1. Davis C., Schiller M., Wheeler K., IT AUDITING, using controls to protect information assets, The McGraw-Hill companies, Osborne, New York, USA 2. Dănescu T., Audit financiar: convergente intre teorie si practica, IRECSON Publishing House, Bucureşti 3. Eden A., Stanciu V., Auditul sistemelor informatice, Dual tech Publishing House, Bucureşti 4. Renard J., Teoria si practica auditului intern, Ministerului de Finanţe Publishing House, Bucureşti 5. Rus I., Dănescu T., The Information Audit between necessity and regulation, in APPLIED ECONOMICS, BUSINESS & DEVELOPMENT, 2010, Kantaoui, Sousse, TUNISIA, available online at p /10/ details. aspx?id=7558, 22/10/ /05/
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Audit Tools That Won t Break the Bank
Audit Tools That Won t Break the Bank 2011 Date or subtitle Presented by: Mark Scholl, Partner 1 Background These tools do not require a strong technical background! Do not scan or install tools without
Practical Guidance for Auditing IT General Controls. September 2, 2009
Practical Guidance for Auditing IT General Controls Chase Whitaker, CPA, CIA September 2, 2009 About Hospital Corporation of America $28B annual revenue $24B total assets $4.6B EBDITA $673M Net Income
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router
1. Installation and configuration guidelines for the router replacement This guideline served as a reference for schools which plan to replace the existing WebSAMS router by the recommended router, and
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Belarc Advisor Security Benchmark Summary
Page 1 of 5 The license associated with the Belarc Advisor product allows for free personal use only. Use on multiple computers in a corporate, educational, military or government installation is prohibited.
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
IT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
How To Use Quantum Rbs Inc. Small Business Backup
Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
Access control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0
Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
