network security evaluation and security audit

Post on 26-Nov-2015

6 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

All about networksecurity

TRANSCRIPT

Network Security Evaluation and Security Audit

Network Security Evaluation

Today the majority of corporate networks are built without any emphasis on information security. This provokes hacker attacks and insider activities, the number of which grows permanently.

Main Steps of Security Evaluation

The main purpose of a security evaluation is to discover weak points in the architecture of IT infrastructure. Such weaknesses quite often remain undiscovered after a penetration test, as the main purpose of penetration test is to bypass existing security mechanisms, but not to check the entire architecture. A good example is a local antivirus policy and updates. Another example can be a proper user privileges separation and management, or

confidential data processing, safe storage and encryption. All these points are brought to your attention during security evaluation process.

Security Audits

Security assessment of the points above should be performed during a security audit:

Network Architecture and Configuration Hardware Firewalls and Routers Configuration User Authentication and Access Management Updates and Patches Management System Configuration System Services and Applications Configuration Antivirus Software Management Confidential Data Handling and Encryption Backup System Management Local Security Policy Review Presence and Qualification of Internal Incident Response Team Physical Security

Assessment results will identify the most important and critical IT threats and risks for business processes for their further elimination. All this makes security audit indispensable solution for independent and comprehensive security testing that will discover all vulnerabilities and weaknesses of your IT infrastructure.

top related