Security Audit

2231 Words5 Pages

Security auditing in any company involves establishing security levels in the company’s system. It comprises of vulnerability scans, reviewing applications and systems controls, and analyzing physical access into the system. Auditing is carried out to ensure information integrity of a company’s data and reliability of data exchange process through networked environment. In most cases, security auditing is done to ensure security measures are in place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises.

Security Audit

Ariam travel agency handles bulk information that contains sensitive customers and employees’ information; it contains multiple external users and various e-commerce applications. Therefore, data security at this company is very important. Information that requires protection in this agency include customers details, associated business procedures, company policies, employees’ information, network documentation, security policies, and sensitive business procedures among others.

Firstly, when trying to cover the loopholes caused by network vulnerabilities, we identify people who have access to the company’s information. These include the employees, customers, programmers and network coordinators at large. Then, we sort out the limits of access of the information and the type of information various parties can access. Another factor is the occasion at which the data is accessible and from where the data can be retrieved. At this stage, we need to identify the network configuration, connection to the external network and the protection levels portrayed.

Since Ariam travel agenc...

... middle of paper ...

... the network that shares information throughout the network. Remote access to the network is restricted and therefore loopholes are intervened while monitoring software, scanning servers and network routers ensure integrity of information stored. The system is therefore competent enough to secure the company from hacker and crackers, and best for business.

Works Cited

Haixin Wang, Guoqiang Bai and Hongyi Chen, (2009). Design and implementation of a high

performance network security.

Harrish Setee, (2001). Security best practices. System administrator.

Keller, John, (2005). Military & Aerospace Electronics, Physical security and wireless networks

are driving today's technology trends in rugged handheld computers and PDAs. Vol. 16 Issue 9, p26-28, 3p

Verton, Dan. (2001). Physical Security Seen as Key in Protecting Networks, Computerworld.

Vol. 35 Issue 30,

Open Document