Enterprise Security Audits

Ali Pabrai, Uday O.
September 2005
Certification Magazine;Sep2005, Vol. 7 Issue 9, p30
This article focuses on the importance of auditing to computer security in business enterprises. Security audits provide a methodical examination and review of the enterprises defenses, resulting in an audit report that summarizes findings and provides details about problems or concerns. Auditing the vital infrastructure components of the enterprise is a critical activity for any organization. The core objective is to verify that the organization is in compliance with any applicable legislative requirements and to ensure that security gaps in the infrastructure have been closed and locked.


Related Articles

  • Losing Customer Trust. Allen, Martin // Credit Control;2006, Vol. 27 Issue 2, p57 

    The article focuses on the effect of security breaches on companies in the banking and finance sector. Security breaches can have a devastating effect on companies, like Boeing Co. who lost a laptop containing personal financial data on 161,000 current and former employees. The author examines...

  • Realistic Expectations. Heiser, Jay G. // Information Security;Jul2005, Vol. 8 Issue 7, p72 

    Offers advice for security managers regarding their business organization's commitment to establish an information security program. Significance of a risk management framework; Identification of likely failure scenarios and mitigation recommendations; Emphasis on professionalism.

  • HATE REGULATIONS?: DON'T. THEY'RE OPPORTUNITIES. Zalud, Bill // SDM: Security Distributing & Marketing;Oct2009, Vol. 39 Issue 10, p45 

    The article discusses the opportunities brought by mandated security regulations, standards, and rules to government and all industrial infrastructures. It cites an example of these security regulations such as the Bank Protect Act (BPA) required for banks to adopt security programs which...

  • Businesses should pay more attention to software security. Greene, Tim // Network World;2/20/2006, Vol. 23 Issue 7, p12 

    The article focuses on the importance of business enterprises to pay more interest and significance to computer software security in the U.S. The problem of companies lies on their failure to ask about the security of the commercial software they are using. Washington Mutual Inc. chief...

  • Security Morphs into Risk Management.  // CIO Insight;2006 Research, p46 

    The article reports on the importance of risk management to the improvement of security in information technology (IT). The prediction in the 2006 Top Trends issue which focused on the integration of IT security with an enterprise risk-management such as compliance, legal, and risks has been...

  • Emerging Intelligent Information Security Systems. Ahlm, Eric // Scientific Computing;Jan2006, Vol. 23 Issue 2, p26 

    The article considers the emergence of intelligent computer security systems. It reveals the challenges that keep computer security dynamic. It stresses the importance of testing security technologies. It cites a number of technologies used to test security tools. It addresses the problem with...

  • Privacy.  // Network Dictionary;2007, p385 

    A definition of the term "privacy," which refers to issues such as preventing information from being viewed by unauthorized parties, is presented.

  • CLASSIC, MODERN, AND POST-MODERN APPROACHES TO MAKING SECURITY STRATEGY. Tagarev, Todor; Ivanova, Petya // Proceedings of the International Conference on Information Techn;2009, Vol. 1, Special section p7 

    The article describes classic, modern and post-modern approaches to making security strategy. Security strategy is defined in the article as the art and science of developing, applying, and coordinating the instruments of national power to achieve national security objectives. The challenges of...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics