Preview

Unit 4

Powerful Essays
Open Document
Open Document
1878 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4
It 255
Hana Laplant
4/12/12
Unit 4
Assignment 1&2
Enhance an existing it security policy framework
Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2.
Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.
To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements.
Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit entries that an analyst would need to sift through to identify the narrow set of entries that warrant closer examination. This could cause delays or even prevent auditors from identifying suspicious activity. Thus, over-monitoring can leave an organization as vulnerable as monitoring too little.
New auditing features in Windows 7 and Windows Server 2008 R2 make it easier to audit important user, computer, and network activities in a focused, efficient manner. These features

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Logs are a great monitoring tool that provides a record of events. As such, I need every occurrence to be logged, tracked and reported on. For each entry, I want to know "what" occurred, "when" it occurred, and "who" or what cause it. Monitoring compliance would allow me to: (1) "Detect and correct violations (2) Provide evidence to support enforcement actions (3) Evaluate program progress by establishing compliance status (4) Provide case studies for staff training (The SANS Institute, 2012). At each location I would nominate ISS enforcement officers who will be held responsible for monitoring and enforcement strategies to ensure that employees act in according with acceptable use policies (AUPs), set forth by management to ensure the organization assets are protected. Sguil (pronounced sgweel) is one of the best GUI monitoring tool around I would use that provides "real time events, sessions data, and raw packet captures." It facilitates seamless analysis, as when an alert that needs more investigation has been identified, it makes a decision on how to handle the situation. Sguil uses a backend database for most of its data, which allows users to perform SQL queries against several different types of security events (The SANS Institute, 2012). For access control, I would use…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Hunton, J. E. (2004). Core concepts of Information Technology auditing. In. (Ed), Conducting the IT audit (pp. 207-227). Retrieved from Retrieved from University of Phoenix eBook Collection Database…

    • 2536 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Audit Proposal - 1ç

    • 1626 Words
    • 7 Pages

    There are various types of audits available when it comes to examining accounting information systems. All audits should be able to evaluate obtained evidence which can determine if – for this instance, information systems – process are operating effectively and there is a strong comfort in the integrity of the data. Typically information systems audits are performed in conjunction with financial statement audits or internal audits, however, an examination may be performed whenever management/clients deem necessary.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    One of the hottest topics in the Information security industry now is the Managed Security Services. Everyday, we keep hearing about different organizations proposing for managed security services, presenter 's preparing hundreds of slides on describing the functions, importance and benefits of managed security services. This report is an…

    • 5432 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    Usage auditing: Verifies that systems and software are used appropriately and consistently with organizational policies. A usage audit may entail physically inspecting systems, verifying software configurations, and conducting other activities intended to prove that resources are being used appropriately. Periodically inspecting systems to ensure that software updates and patches are current and that only approved software is installed is a good idea.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Auditing is about understanding requirements, looking for opportunities for improvement, looking for best practices, asking questions, gathering information, analyzing what’s seen and heard, forming opinions and reaching conclusions. This effort requires that auditors be prepared,…

    • 2142 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    Security paper

    • 1480 Words
    • 6 Pages

    Walt, C. v. (2010, Nov 03 ). Introduction to Security Policies, Part One: An Overview of…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Honeypots

    • 1901 Words
    • 8 Pages

    Although there exist a number of security tools that are available today, none of these tools can easily address all of the security goals of an organization. As computer attacks evolve, new responses are essential. Thus organisations look for more advanced tools which are effective in detecting security attacks and recovering from them.…

    • 1901 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    “Information Security Management: Not A Technology Problem”. 2001. Building Comprehensive Information Security Programs. White Paper.…

    • 2534 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    System Audit

    • 12719 Words
    • 51 Pages

    3) Audit automation and system testing: Computer assisted audit techniques. Traditional vs modern audit tools,…

    • 12719 Words
    • 51 Pages
    Powerful Essays
  • Good Essays

    it control

    • 2296 Words
    • 10 Pages

    Controls for providing information security can be physical, technical, or administrative. These three categories of controls can be further classified as either preventive or detective. Preventive controls attempt to avoid the occurrence of unwanted events, whereas detective controls attempt to identify unwanted events after they have occurred. Preventive controls inhibit the free use of computing resources and therefore can be applied only to the degree that the users are willing to accept. Effective security awareness programs can help increase users’ level of tolerance for preventive controls by helping them understand how such controls enable them to trust their computing systems. Common detective controls include audit trails, intrusion detection methods, and checksums.…

    • 2296 Words
    • 10 Pages
    Good Essays
  • Good Essays

    * Employee Monitoring similarly monitors and records all instant messages, including usernames and passwords, and the conversations from both participants. Employee Monitoring performs equally well for email as well. Employee Monitoring targets time usage inefficiencies, spots activities which are against policy prior to their becoming crises, and tracks spyware and hack attempts on the network, all at much more reasonable costs than other solutions.…

    • 626 Words
    • 3 Pages
    Good Essays