Verified Document

Network Audit Case Study Case Study

Network Audit Case Study This study focuses on a comprehensive list of top ten tips of network and business continuity audit. These tips might lead businesses to survive and thrive in their audits without the need to overhaul their entire infrastructure.

Top ten network and business continuity-auditing tips

Segmentation of tasks distinctively: It depends on the principle of drive and conquers. It involves brainstorming about the organization's security tasks in terms of pieces and separating them into logically and physically segments. For instance, security tasks depend on ensuring people are kept on the outside by using both physical and firewall security (Bergmann & Pamplin, 2013). However, other components are safely kept on the inside using antivirus. Security does not solely imply that people should be kept from the outside. Obviously, companies have lost information from within the business. In this case, each piece must be documented and prioritized.

Documenting all things on the network: A business is only able to manage what it knows exists. Companies must collect all relevant information connected to its networking. This includes switches, routers, servers, portable computing devices,...

Parts of this document are hidden

View Full Document
svg-one

A company can use software to draw its network automatically because it permits the company to verify everything belonging to the network (Gregory, 2010).
Automation: A company is required to automate tasks so that they can be easily repeated with little effort. Mistakes must be made, particularly when conducting manual procedures, repetitive tasks and inaccurate procedures. Computers tend to be more cost effective and excel at repetitive tasks in the long-term. The selected software must provide ease of presenting auditors with the changes from the previous inspection (Gregory, 2010). Automating things enable the IT department to concentrate on delivering value to the company to improve products, services, and results.

Step-by-step information verification: After segmenting the tasks into distinct pieces, they must be prioritized. The company must identify key elements on each segment verified to confirm initial findings. After the spot-checking, internal audits must be performed on the systems beginning with components with first priority. Verification must be integrated within the system. Checks and balances must be incorporated into the processes.

Maintaining equipment:…

Sources used in this document:
References

Bergmann, T.S., & Pamplin, B. (2013). CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Ind: Wiley Pub.

Gregory, P.H. (2010). CISA certified information systems auditor all-in-one exam guide. New York: McGraw-Hill.

Website: http://www.dallascityhall.com/pdf/Auditor/LanWan.pdf
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now