Network Audit Case Study Case Study

PAGES
2
WORDS
701
Cite

Network Audit Case Study This study focuses on a comprehensive list of top ten tips of network and business continuity audit. These tips might lead businesses to survive and thrive in their audits without the need to overhaul their entire infrastructure.

Top ten network and business continuity-auditing tips

Segmentation of tasks distinctively: It depends on the principle of drive and conquers. It involves brainstorming about the organization's security tasks in terms of pieces and separating them into logically and physically segments. For instance, security tasks depend on ensuring people are kept on the outside by using both physical and firewall security (Bergmann & Pamplin, 2013). However, other components are safely kept on the inside using antivirus. Security does not solely imply that people should be kept from the outside. Obviously, companies have lost information from within the business. In this case, each piece must be documented and prioritized.

Documenting all things on the network: A business is only able to manage what it knows exists. Companies must collect all relevant information connected to its networking. This includes switches, routers, servers, portable computing devices,...

...

A company can use software to draw its network automatically because it permits the company to verify everything belonging to the network (Gregory, 2010).
Automation: A company is required to automate tasks so that they can be easily repeated with little effort. Mistakes must be made, particularly when conducting manual procedures, repetitive tasks and inaccurate procedures. Computers tend to be more cost effective and excel at repetitive tasks in the long-term. The selected software must provide ease of presenting auditors with the changes from the previous inspection (Gregory, 2010). Automating things enable the IT department to concentrate on delivering value to the company to improve products, services, and results.

Step-by-step information verification: After segmenting the tasks into distinct pieces, they must be prioritized. The company must identify key elements on each segment verified to confirm initial findings. After the spot-checking, internal audits must be performed on the systems beginning with components with first priority. Verification must be integrated within the system. Checks and balances must be incorporated into the processes.

Maintaining equipment:…

Sources Used in Documents:

References

Bergmann, T.S., & Pamplin, B. (2013). CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Ind: Wiley Pub.

Gregory, P.H. (2010). CISA certified information systems auditor all-in-one exam guide. New York: McGraw-Hill.

Website: http://www.dallascityhall.com/pdf/Auditor/LanWan.pdf


Cite this Document:

"Network Audit Case Study" (2013, September 30) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/network-audit-case-study-123427

"Network Audit Case Study" 30 September 2013. Web.18 April. 2024. <
https://www.paperdue.com/essay/network-audit-case-study-123427>

"Network Audit Case Study", 30 September 2013, Accessed.18 April. 2024,
https://www.paperdue.com/essay/network-audit-case-study-123427

Related Documents

Ford Motor Company Case Study of Ford Motor Company History, Development and Growth Ford Motor Company has been a vital American automaker since its incorporation in 1902. The car maker was started at that time by Henry Ford and has continued with some member of the family on the board of directors since that time. The company began selling individually manufactured vehicles, but moved to an innovation devised by the founder soon after.

Case Studies on FAA
PAGES 15 WORDS 4608

Federal Aviation Authority Brief Description Of The Case: The research study will make an effort to observe the related facts and figures of the Federal Aviation Authority of United States. The analysis of the details and structures of the organization will be taken into consideration keeping in view the problems and the obstructions which are coming in the development of the organization and which are affecting the organizational framework. The study will

Koss Corporation Case Study Fraudulent activities Just as many other businesses, Koss Corporation had an internal control system meant to protect the organization's assets. The fraudulent activities, which occurred, include misuse of petty cash, large payments by wire transfer or check, unprepared account reconciliation, outdated computerized accounting system, and minimal management review of official statements (Anderson, 2013). Problems in the corporate governance and/or organizational structure However, the computerized accounting system of Koss Corporation was

Strategic Case Study Woolworths Supermarkets Strategic analysis External analysis Turbulence model Porters' five forces 6O/Ts evident Competitive strengths Competitive position in the market Weakness evident Mission statement Vision Strategic objectives Ethics matrix Stakeholder theory analysis Key broad business-level and international strategies Strategic implementation: General perspective Key strategic implementation issues Strategic evaluation Current and future prospects and recommendations Woolworths Supermarkets Woolworths Supermarkets is one of the largest supermarkets in Australia. The Woolworths Supermarkets has been in service for the last decade and has done a lot of production and growth in the

In this regard the firm made the tactical decision to handle the outbound logistics of Porter's Value Chain in order to increase margins (NetMBA. N.D.). McIntyre realized that use of company resources would be better utilized with a direct selling approach. A Resource Audit of the firm's physical, human, and financial resources elucidated that direct sales would drive profit margins higher as employees could foster connections abroad and develop

First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels