network security evaluation and security audit

3
Network Security Evaluation and Security Audit Network Security Evaluation Today the majority of corporate networks are built without any emphasis on information security. This provokes hacker attacks and insider activities, the number of which grows permanently. Main Steps of Security Evaluation

Upload: ritcher-hardy

Post on 26-Nov-2015

6 views

Category:

Documents


2 download

DESCRIPTION

All about networksecurity

TRANSCRIPT

Page 1: Network Security Evaluation and Security Audit

Network Security Evaluation and Security Audit

Network Security Evaluation

Today the majority of corporate networks are built without any emphasis on information security. This provokes hacker attacks and insider activities, the number of which grows permanently.

Main Steps of Security Evaluation

The main purpose of a security evaluation is to discover weak points in the architecture of IT infrastructure. Such weaknesses quite often remain undiscovered after a penetration test, as the main purpose of penetration test is to bypass existing security mechanisms, but not to check the entire architecture. A good example is a local antivirus policy and updates. Another example can be a proper user privileges separation and management, or

Page 2: Network Security Evaluation and Security Audit

confidential data processing, safe storage and encryption. All these points are brought to your attention during security evaluation process.

Security Audits

Security assessment of the points above should be performed during a security audit:

Network Architecture and Configuration Hardware Firewalls and Routers Configuration User Authentication and Access Management Updates and Patches Management System Configuration System Services and Applications Configuration Antivirus Software Management Confidential Data Handling and Encryption Backup System Management Local Security Policy Review Presence and Qualification of Internal Incident Response Team Physical Security

Assessment results will identify the most important and critical IT threats and risks for business processes for their further elimination. All this makes security audit indispensable solution for independent and comprehensive security testing that will discover all vulnerabilities and weaknesses of your IT infrastructure.