1 / 1

Key Elements Of IT Security Audit

Centextech
Download Presentation

Key Elements Of IT Security Audit

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Key Elements Of IT Security Audit A comprehensive security audit is required by businesses to check the state of current IT environment and to find out vulnerabilities in the system. Key elements of an IT security audit are: External Vulnerability Check Ethical hacking Penetration testing Network scanning Internal Network Configuration Check Anti-virus check Firewall configuration Server patching check Configuration of switches Device security check Active directory setup check Warranties and software licensing check Backup and disaster recovery check IT Policies Audit Physical Security Check Password policy Building access Remote access policy Server & workstation accessibility check Mobile usage policy File sharing policy www.centextech.com Centex Technologies 1201 Peachtree St NE, Suite 200, Atlanta, GA 30361 7600 Chevy Chase Drive, Suite 300, Austin, TX 78752 13355 Noel Road, Suite # 1100, Dallas, TX 75240 501 N. 4th Street, Killeen, TX 76541 Phone: (404) 994 - 5074 Phone: (512) 956 - 5454 Phone: (972) 375 - 9654 Phone: (254) 213 - 4740 Image Source: Designed by Freepik

More Related