CS459/559 - Network Security - Chapter 9 Security Audits
- The Usefulness of an Audit
- Useful for troubleshooting
- can protect against viral attacks (ensure that executables don't change between audits)
- ensures that no pirated software exists on system
- tracks how many copies of software have been puchased (and how many are being used)
- Network Auditing Tools
- NT Event Log Files
- UNIX?
- Netware?
- The Auditing Process
Document auditing process in the security policy
- Human Relations Factors
- Security Drills
- Testing
- test all aspects of the security policy
- all tests should be comprehensive
- Audit Steps
- Review the system being audited
- Examine the overall environment in which the security system is operating; identify techniques used to control this environment
- Determine the effectiveness of each component of the security system.
- Assess the total security system.
- Document and illustrate the findings
- Assess Management
- Is the company buying more software than necessary?
- What are the terms of the software license?
- Which individuals in your company need to use which software products?
- Has the company been buying software for employees who do not use it?
Types of asset managemnt
- Inventory
- Metering
- Distribution