SlideShare a Scribd company logo
1 of 1
Download to read offline
Consider the given scenario and list the recommended control changes and prepare the detailed
audit report:
The company examined is a multi -national commodity and service provider, with involvement in
several areas of the energy sector, including power generation, natural gas Transportation, and
related trading activities. Most employees are based in an office tower in the companys home city;
however, there are many satellite offices and field locations that utilize the corporate network to
varying degrees. The company relies on the availability and integrity of an extensive wide area
private data communications network to support virtually every business activity. This network,
and its associated management practices, have been constructed over the life of the company
through several mergers and acquisitions, and is the product of a wide variety of components,
technologies, and services. It is comprised of a variety of platforms, including NT, VMS, UNIX,
Novel and associated hardware components. The situation is further complicated by a recent
merger with another large company that employed different management practices and network
architecture. The network is protected from external intrusion by the use of standard controls
including firewalls and remote access servers.

More Related Content

Similar to Consider the given scenario and list the recommended control.pdf

Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
Cloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesCloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesThe World Bank
 
Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Graham McInnes
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
Ericsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson
 
Jarrod_Rebich_Resume
Jarrod_Rebich_ResumeJarrod_Rebich_Resume
Jarrod_Rebich_ResumeJarrod Rebich
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCiaran Roche
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloudEricsson Latin America
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 

Similar to Consider the given scenario and list the recommended control.pdf (20)

Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
E018113036
E018113036E018113036
E018113036
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
Service providers presentation
Service providers presentationService providers presentation
Service providers presentation
 
Cloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesCloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - Challenges
 
Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Ericsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson Review: Communications as a cloud service: a new take on telecoms
Ericsson Review: Communications as a cloud service: a new take on telecoms
 
Jarrod_Rebich_Resume
Jarrod_Rebich_ResumeJarrod_Rebich_Resume
Jarrod_Rebich_Resume
 
2010fall ch31 naymka
2010fall ch31 naymka2010fall ch31 naymka
2010fall ch31 naymka
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
What is colocation
What is colocationWhat is colocation
What is colocation
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 

More from adharvamobiles

Considere los siguientes dilemas ticos que puede enfrentar .pdf
Considere los siguientes dilemas ticos que puede enfrentar .pdfConsidere los siguientes dilemas ticos que puede enfrentar .pdf
Considere los siguientes dilemas ticos que puede enfrentar .pdfadharvamobiles
 
Consider your organization strategic plan If your organizat.pdf
Consider your organization strategic plan If your organizat.pdfConsider your organization strategic plan If your organizat.pdf
Consider your organization strategic plan If your organizat.pdfadharvamobiles
 
Consider your attitudes identified in the questionnaire Out.pdf
Consider your attitudes identified in the questionnaire Out.pdfConsider your attitudes identified in the questionnaire Out.pdf
Consider your attitudes identified in the questionnaire Out.pdfadharvamobiles
 
Consider two random variables X and Y whose relationship is .pdf
Consider two random variables X and Y whose relationship is .pdfConsider two random variables X and Y whose relationship is .pdf
Consider two random variables X and Y whose relationship is .pdfadharvamobiles
 
Consider two linked genes A and B A doubleheterozygous ind.pdf
Consider two linked genes A and B A doubleheterozygous ind.pdfConsider two linked genes A and B A doubleheterozygous ind.pdf
Consider two linked genes A and B A doubleheterozygous ind.pdfadharvamobiles
 
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdf
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdfConsider two light fixtures Fixture 1 has 2 light bulbs F.pdf
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdfadharvamobiles
 
Consider two independent events A and B Suppose it is known.pdf
Consider two independent events A and B Suppose it is known.pdfConsider two independent events A and B Suppose it is known.pdf
Consider two independent events A and B Suppose it is known.pdfadharvamobiles
 
Consider this cellular phone system when you try to call t.pdf
Consider this cellular phone system when you try to call t.pdfConsider this cellular phone system when you try to call t.pdf
Consider this cellular phone system when you try to call t.pdfadharvamobiles
 
Consider these claims concerning the Affordable Care Act a.pdf
Consider these claims concerning the Affordable Care Act a.pdfConsider these claims concerning the Affordable Care Act a.pdf
Consider these claims concerning the Affordable Care Act a.pdfadharvamobiles
 
Consider two countries Albania relatively abundant in low.pdf
Consider two countries Albania relatively abundant in low.pdfConsider two countries Albania relatively abundant in low.pdf
Consider two countries Albania relatively abundant in low.pdfadharvamobiles
 
Consider the UK and Romania producing and trading capitali.pdf
Consider the UK and Romania producing and trading capitali.pdfConsider the UK and Romania producing and trading capitali.pdf
Consider the UK and Romania producing and trading capitali.pdfadharvamobiles
 
Consider the Turing machine above The alphabet consists of .pdf
Consider the Turing machine above The alphabet consists of .pdfConsider the Turing machine above The alphabet consists of .pdf
Consider the Turing machine above The alphabet consists of .pdfadharvamobiles
 
Consider the Table below which shows data for Firm D The fi.pdf
Consider the Table below which shows data for Firm D The fi.pdfConsider the Table below which shows data for Firm D The fi.pdf
Consider the Table below which shows data for Firm D The fi.pdfadharvamobiles
 
Consider the simple economy that produces only three product.pdf
Consider the simple economy that produces only three product.pdfConsider the simple economy that produces only three product.pdf
Consider the simple economy that produces only three product.pdfadharvamobiles
 
Consider the same two families from question 1 but this ti.pdf
Consider the same two families from question 1  but this ti.pdfConsider the same two families from question 1  but this ti.pdf
Consider the same two families from question 1 but this ti.pdfadharvamobiles
 
Consider the same scenario as above A recent poll conducted.pdf
Consider the same scenario as above A recent poll conducted.pdfConsider the same scenario as above A recent poll conducted.pdf
Consider the same scenario as above A recent poll conducted.pdfadharvamobiles
 
Consider the relation PLAYER with relational schema PLAYER .pdf
Consider the relation PLAYER with relational schema PLAYER .pdfConsider the relation PLAYER with relational schema PLAYER .pdf
Consider the relation PLAYER with relational schema PLAYER .pdfadharvamobiles
 
Consider the graph below and answer the questions that follo.pdf
Consider the graph below and answer the questions that follo.pdfConsider the graph below and answer the questions that follo.pdf
Consider the graph below and answer the questions that follo.pdfadharvamobiles
 
Consider the process of Darwinian evolution in which organis.pdf
Consider the process of Darwinian evolution in which organis.pdfConsider the process of Darwinian evolution in which organis.pdf
Consider the process of Darwinian evolution in which organis.pdfadharvamobiles
 
Consider the following time series data a Construct a tim.pdf
Consider the following time series data a Construct a tim.pdfConsider the following time series data a Construct a tim.pdf
Consider the following time series data a Construct a tim.pdfadharvamobiles
 

More from adharvamobiles (20)

Considere los siguientes dilemas ticos que puede enfrentar .pdf
Considere los siguientes dilemas ticos que puede enfrentar .pdfConsidere los siguientes dilemas ticos que puede enfrentar .pdf
Considere los siguientes dilemas ticos que puede enfrentar .pdf
 
Consider your organization strategic plan If your organizat.pdf
Consider your organization strategic plan If your organizat.pdfConsider your organization strategic plan If your organizat.pdf
Consider your organization strategic plan If your organizat.pdf
 
Consider your attitudes identified in the questionnaire Out.pdf
Consider your attitudes identified in the questionnaire Out.pdfConsider your attitudes identified in the questionnaire Out.pdf
Consider your attitudes identified in the questionnaire Out.pdf
 
Consider two random variables X and Y whose relationship is .pdf
Consider two random variables X and Y whose relationship is .pdfConsider two random variables X and Y whose relationship is .pdf
Consider two random variables X and Y whose relationship is .pdf
 
Consider two linked genes A and B A doubleheterozygous ind.pdf
Consider two linked genes A and B A doubleheterozygous ind.pdfConsider two linked genes A and B A doubleheterozygous ind.pdf
Consider two linked genes A and B A doubleheterozygous ind.pdf
 
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdf
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdfConsider two light fixtures Fixture 1 has 2 light bulbs F.pdf
Consider two light fixtures Fixture 1 has 2 light bulbs F.pdf
 
Consider two independent events A and B Suppose it is known.pdf
Consider two independent events A and B Suppose it is known.pdfConsider two independent events A and B Suppose it is known.pdf
Consider two independent events A and B Suppose it is known.pdf
 
Consider this cellular phone system when you try to call t.pdf
Consider this cellular phone system when you try to call t.pdfConsider this cellular phone system when you try to call t.pdf
Consider this cellular phone system when you try to call t.pdf
 
Consider these claims concerning the Affordable Care Act a.pdf
Consider these claims concerning the Affordable Care Act a.pdfConsider these claims concerning the Affordable Care Act a.pdf
Consider these claims concerning the Affordable Care Act a.pdf
 
Consider two countries Albania relatively abundant in low.pdf
Consider two countries Albania relatively abundant in low.pdfConsider two countries Albania relatively abundant in low.pdf
Consider two countries Albania relatively abundant in low.pdf
 
Consider the UK and Romania producing and trading capitali.pdf
Consider the UK and Romania producing and trading capitali.pdfConsider the UK and Romania producing and trading capitali.pdf
Consider the UK and Romania producing and trading capitali.pdf
 
Consider the Turing machine above The alphabet consists of .pdf
Consider the Turing machine above The alphabet consists of .pdfConsider the Turing machine above The alphabet consists of .pdf
Consider the Turing machine above The alphabet consists of .pdf
 
Consider the Table below which shows data for Firm D The fi.pdf
Consider the Table below which shows data for Firm D The fi.pdfConsider the Table below which shows data for Firm D The fi.pdf
Consider the Table below which shows data for Firm D The fi.pdf
 
Consider the simple economy that produces only three product.pdf
Consider the simple economy that produces only three product.pdfConsider the simple economy that produces only three product.pdf
Consider the simple economy that produces only three product.pdf
 
Consider the same two families from question 1 but this ti.pdf
Consider the same two families from question 1  but this ti.pdfConsider the same two families from question 1  but this ti.pdf
Consider the same two families from question 1 but this ti.pdf
 
Consider the same scenario as above A recent poll conducted.pdf
Consider the same scenario as above A recent poll conducted.pdfConsider the same scenario as above A recent poll conducted.pdf
Consider the same scenario as above A recent poll conducted.pdf
 
Consider the relation PLAYER with relational schema PLAYER .pdf
Consider the relation PLAYER with relational schema PLAYER .pdfConsider the relation PLAYER with relational schema PLAYER .pdf
Consider the relation PLAYER with relational schema PLAYER .pdf
 
Consider the graph below and answer the questions that follo.pdf
Consider the graph below and answer the questions that follo.pdfConsider the graph below and answer the questions that follo.pdf
Consider the graph below and answer the questions that follo.pdf
 
Consider the process of Darwinian evolution in which organis.pdf
Consider the process of Darwinian evolution in which organis.pdfConsider the process of Darwinian evolution in which organis.pdf
Consider the process of Darwinian evolution in which organis.pdf
 
Consider the following time series data a Construct a tim.pdf
Consider the following time series data a Construct a tim.pdfConsider the following time series data a Construct a tim.pdf
Consider the following time series data a Construct a tim.pdf
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Consider the given scenario and list the recommended control.pdf

  • 1. Consider the given scenario and list the recommended control changes and prepare the detailed audit report: The company examined is a multi -national commodity and service provider, with involvement in several areas of the energy sector, including power generation, natural gas Transportation, and related trading activities. Most employees are based in an office tower in the companys home city; however, there are many satellite offices and field locations that utilize the corporate network to varying degrees. The company relies on the availability and integrity of an extensive wide area private data communications network to support virtually every business activity. This network, and its associated management practices, have been constructed over the life of the company through several mergers and acquisitions, and is the product of a wide variety of components, technologies, and services. It is comprised of a variety of platforms, including NT, VMS, UNIX, Novel and associated hardware components. The situation is further complicated by a recent merger with another large company that employed different management practices and network architecture. The network is protected from external intrusion by the use of standard controls including firewalls and remote access servers.