Discuss operational auditing. Include in your discussion what should be looked for in an operational audit and what methods might be used in the audit.
What will be an ideal response?
In an operational audit, a company's IT staff examine system logs to confirm whether they
are auditing needed information and not getting bogged down with unnecessary data. An
operational audit should look for the following:
Accounts that have weak passwords or no passwords
Accounts assigned to employees who have left the company or user group
New accounts that need to be checked against a list of authorized users
These audits might include attempts at social engineering-attempting to trick employees into divulging passwords or other information. Auditors who work onsite in financial institutions even look in trash cans to see whether computer printouts of confidential information have been discarded without being shredded. Another auditing strategy is a Tinkerbell program, in which network connections are scanned and alerts are generated when connection attempts are made from suspicious sites or logons are attempted from a suspicious IDPS.
You might also like to view...
Briefly describe the kind of animations that you can construct using Rhino.
What will be an ideal response?
A(n) ________ is also known as an anchor point
Fill in the blank(s) with correct word
In addition to the preset gradients that come with Photoshop, you can create your own customized gradients in the Gradient Editor dialog box.
Answer the following statement true (T) or false (F)
The aspect ratio for wide-screen monitors is 16:9
Indicate whether the statement is true or false