Security Audit

1287 Words3 Pages

• The HoneyTree was hired by another company to conduct a security audit to examine the vulnerabilities of its information systems. To complete the security audit, it must be determined if there are vulnerabilities of its informational system. The set up and the overall security of the network area will be tested. The company is a five building campus. All five buildings, inside and outside will be tested. The perimeter of the campus will also be tested to make sure that no internet service is outside the campus. In order to complete the audit a list of all users, databases, and passwords will be needed. Access to the grounds to observe who has access to what will also be crucial. Going in and out of buildings into rooms will help identify which rooms have computers and who has access to them. Access to servers and the central hub will also be needed to test the security.

• The procedure that will take place during the audit will be thorough. All five buildings will be tested, inside and outside. The audit will test for user authentication, firewalls, penetration, eavesdropping, human error, surveillance, user access and Wi-Fi access. It will also inspect the security of the central hub with connected servers. There are five buildings on campus all connected to a campus area network. Each individual building has its own Wi-Fi LAN. None of the five buildings allow internet service outside the campus. The buildings connect to one another by a central hub. This central hub has a blade database server, internet/email server, a backup server and a router. During the testing time, outside audits will be conducted and inside on campus as well. The architecture of the network needs to be tested making sure that network ...

... middle of paper ...

...sonal. A system of keys, maybe even biometrics identification, and cameras should also be monitoring the servers to make sure it is difficult to gain direct access to them. Outside the buildings, there should be security cameras monitoring all the people walking outside and entering the buildings. If something were to occur, you could use the surveillance of the cameras to possibly identify any suspects. In order to use the surveillance at night, the campus should be well lit. A follow up will be conducted in four months to see how the security of the campus is doing. The suggestions that were given should be in place or being worked on to secure the network. The follow up will also make sure there are no new threats to security. This will show that the audit was taken seriously and security measures are being put into place in order to secure the network.

More about Security Audit

Open Document