blog




  • Essay / Security Audit - 2231

    Security audit in any business involves establishing security levels in the business system. It includes vulnerability scans, review of application and system controls, and analysis of physical access to the system. Auditing is carried out to ensure the integrity of a company's data information and the reliability of the data exchange process through a networked environment. In most cases, a security audit is carried out to ensure that security measures are in place to protect the business against the loss of information to the outside world. This document addresses all issues related to the security audit of the Ariam travel agency network and its premises. Security audit Ariam travel agency manages bulk information containing sensitive customer and employee information; it contains several external users and various e-commerce applications. Data security in this company is therefore very important. Information that requires protection in this agency includes, among others, customer details, associated business procedures, company policies, employee information, network documentation, security policies and sensitive business procedures . First, when we try to cover gaps caused by network vulnerabilities, we identify people who have access to company information. These include employees, customers, programmers, and network coordinators in general. Next, we determine the limits of information access and the type of information that different parties can access. Another factor is when the data is accessible and from which it can be retrieved. At this stage we need to identify the network configuration, connection to the external network and the protection levels presented. From the Ariam travel agency...... middle of paper ...... the network that shares information across the network. Remote access to the network is restricted and therefore breaches have occurred while monitoring software, analytics servers and network routers ensure the integrity of stored information. So the system is competent enough to protect the business from hackers and crackers, and best for business. Works Cited Haixin Wang, Guoqiang Bai and Hongyi Chen, (2009). Design and Implementation of High Performance Network Security.Harrish Setee, (2001). Good security practices. System administrator. Keller, John, (2005). Military and aerospace electronics, physical security, and wireless networks are driving today's technology trends in rugged handheld computers and PDAs. Flight. 16 Issue 9, p26-28, 3pVerton, Dan. (2001). Physical Security Considered Key to Network Protection, Computerworld.Vol. 35 Number 30,