Verified Document

Network Audit Case Study Case Study

Network Audit Case Study This study focuses on a comprehensive list of top ten tips of network and business continuity audit. These tips might lead businesses to survive and thrive in their audits without the need to overhaul their entire infrastructure.

Top ten network and business continuity-auditing tips

Segmentation of tasks distinctively: It depends on the principle of drive and conquers. It involves brainstorming about the organization's security tasks in terms of pieces and separating them into logically and physically segments. For instance, security tasks depend on ensuring people are kept on the outside by using both physical and firewall security (Bergmann & Pamplin, 2013). However, other components are safely kept on the inside using antivirus. Security does not solely imply that people should be kept from the outside. Obviously, companies have lost information from within the business. In this case, each piece must be documented and prioritized.

Documenting all things on the network: A business is only able to manage what it knows exists. Companies must collect all relevant information connected to its networking. This includes switches, routers, servers, portable computing devices,...

A company can use software to draw its network automatically because it permits the company to verify everything belonging to the network (Gregory, 2010).
Automation: A company is required to automate tasks so that they can be easily repeated with little effort. Mistakes must be made, particularly when conducting manual procedures, repetitive tasks and inaccurate procedures. Computers tend to be more cost effective and excel at repetitive tasks in the long-term. The selected software must provide ease of presenting auditors with the changes from the previous inspection (Gregory, 2010). Automating things enable the IT department to concentrate on delivering value to the company to improve products, services, and results.

Step-by-step information verification: After segmenting the tasks into distinct pieces, they must be prioritized. The company must identify key elements on each segment verified to confirm initial findings. After the spot-checking, internal audits must be performed on the systems beginning with components with first priority. Verification must be integrated within the system. Checks and balances must be incorporated into the processes.

Maintaining equipment:…

Sources used in this document:
References

Bergmann, T.S., & Pamplin, B. (2013). CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Ind: Wiley Pub.

Gregory, P.H. (2010). CISA certified information systems auditor all-in-one exam guide. New York: McGraw-Hill.

Website: http://www.dallascityhall.com/pdf/Auditor/LanWan.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Case Study of Ford Motor Company
Words: 2344 Length: 8 Document Type: Case Study

Ford Motor Company Case Study of Ford Motor Company History, Development and Growth Ford Motor Company has been a vital American automaker since its incorporation in 1902. The car maker was started at that time by Henry Ford and has continued with some member of the family on the board of directors since that time. The company began selling individually manufactured vehicles, but moved to an innovation devised by the founder soon after.

Case Studies on FAA
Words: 4608 Length: 15 Document Type: Term Paper

Federal Aviation Authority Brief Description Of The Case: The research study will make an effort to observe the related facts and figures of the Federal Aviation Authority of United States. The analysis of the details and structures of the organization will be taken into consideration keeping in view the problems and the obstructions which are coming in the development of the organization and which are affecting the organizational framework. The study will

Koss Corporation Case Study
Words: 685 Length: 2 Document Type: Case Study

Koss Corporation Case Study Fraudulent activities Just as many other businesses, Koss Corporation had an internal control system meant to protect the organization's assets. The fraudulent activities, which occurred, include misuse of petty cash, large payments by wire transfer or check, unprepared account reconciliation, outdated computerized accounting system, and minimal management review of official statements (Anderson, 2013). Problems in the corporate governance and/or organizational structure However, the computerized accounting system of Koss Corporation was

Strategic Case Study Woolworths Supermarkets Strategic Analysis
Words: 3909 Length: 12 Document Type: Case Study

Strategic Case Study Woolworths Supermarkets Strategic analysis External analysis Turbulence model Porters' five forces 6O/Ts evident Competitive strengths Competitive position in the market Weakness evident Mission statement Vision Strategic objectives Ethics matrix Stakeholder theory analysis Key broad business-level and international strategies Strategic implementation: General perspective Key strategic implementation issues Strategic evaluation Current and future prospects and recommendations Woolworths Supermarkets Woolworths Supermarkets is one of the largest supermarkets in Australia. The Woolworths Supermarkets has been in service for the last decade and has done a lot of production and growth in the

Macpac Case Study Strategic Management
Words: 1160 Length: 4 Document Type: Case Study

In this regard the firm made the tactical decision to handle the outbound logistics of Porter's Value Chain in order to increase margins (NetMBA. N.D.). McIntyre realized that use of company resources would be better utilized with a direct selling approach. A Resource Audit of the firm's physical, human, and financial resources elucidated that direct sales would drive profit margins higher as employees could foster connections abroad and develop

Information Systems Multi-Chapter Case Study
Words: 3615 Length: 13 Document Type: Case Study

First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now