Explain the need for a security audit in an organization.

What will be an ideal response?


A security audit evaluates whether an organization has a well-considered security policy in place and if it is being followed. One result of a good audit is a list of items that needs to be addressed in order to ensure that the security policy is being met. A thorough security audit should also test system safeguards to ensure that they are operating as intended. Such tests might include trying the default system passwords that are active when software is first received from the vendor. The goal of such a test is to ensure that all such known passwords have been changed.

Computer Science & Information Technology

You might also like to view...

To show that a function is a time complexity, rather than an instruction function, we use:

A. n B. f(n) C. alpha notation D. theta notation

Computer Science & Information Technology

The stroke and fill colors can be set on the ____ panel.

a. Tools b. Shapes c. Colors d. Options

Computer Science & Information Technology

When you have more than one layer in an InDesign document, the ____________________ commands (Send to Back, Bring to Front, Send Backward, and Bring Forward) are applied only to the items on the currently active layer in the Layers panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In Resource Sheet view of Project 2013, the ________ column determines which calendar your resource will be assigned

A) Base B) Max C) Accrue D) Initial

Computer Science & Information Technology