SlideShare a Scribd company logo
INSPACE TECHNOLOGIES
IT audit (information technology audit)
An IT audit is the examination and evaluation of an organization's information
technology infrastructure, policies and operations.
Information technology audits determine whether IT controls protect corporate
assets, ensure data integrity and are aligned with the business's overall goals.
IT auditors examine not only physical security controls, but also overall
business and financial controls that involve information technology systems.
Because operations at modern companies are increasingly computerized, IT
audits are used to
ensure information-
related controls and
processes are working
properly. The primary
objectives of an IT
audit include.
Evaluate
the systems and
processes in place that
secure company data.
Determine risks to a company's information assets, and help identify methods to
minimize those risks.
Ensure information management processes are in compliance with IT-specific
laws, policies and standards.
Determine inefficiencies in IT systems and associated management.
IT Infrastructure
IT infrastructure refers to the composite hardware, software, network resources
and services required for the existence, operation and management of an
enterprise IT environment. It allows an organization to deliver IT solutions and
services to its employees, partners and/or customers and is usually internal to an
organization and deployed within owned facilities.
Techopedia explains IT Infrastructure
IT infrastructure consists of all components that somehow play a role in overall
IT and IT-enabled operations. It can be used for internal business operations or
developing customer IT or
business solutions.
Typically, a standard IT
infrastructure consists of the
following components:
Hardware: Servers, computers,
data centers, switches, hubs and
routers, and other equipment
Software: Enterprise resource
planning (ERP), customer
relationship management (CRM),
productivity applications and
more
Network: Network enablement, internet connectivity, firewall and security
Meat ware: Human users, such as network administrators (NA), developers,
designers and end users with access to any IT appliance or service are also part
of an IT infrastructure, specifically with the advent of user-centric IT service
development.
Network Auditing
Network auditing is a must for any organization. Networks are dynamic
entities; they grow, shrink, change and divide themselves continuously.
Network administrators cannot even assume this process is entirely under their
control. Users add devices and sometimes even new hardware to the network
infrastructure. Even worse, it is not the first time a user would install software
they need without informing the administrator. These activities can have drastic
repercussions on network security. To solve this, an administrator needs to
perform regular network auditing and monitor any changes to the preset
baseline.
Network auditing is a process
in which your network is
mapped both in terms of
software and hardware. The
process can be daunting if
done manually, but luckily
some tools can help automate
a large part of the process.
The administrator needs to
know what machines and
devices are connected to the
network. He should also know what operating systems are running and to what
service pack/patch level. Another point on the checklist should be what user
accounts and groups are on each machine as well as what shares are available
and to whom. A good network audit will also include what hardware makes up
each machine, what policies affect that machine and whether it is a physical or a
virtual machine. The more detailed
the specification the better.
Once the machines running on our
network are mapped, the
administrator should then move to
audit what software is running on
each of the machines. This can be
done manually, through an
application, or simply asking each
machine owner to run a script that
would automatically catalogue applications and send the administrator an email
with a report of the software installed. After the software inventory is done, the
process can then catalogue the services which are installed, which are running
and which are stopped. The audit for the machines can be finalized by noting
which ports each machine listens on
and what software is actually running
at the time of the audit.
Once the administrator concludes
auditing the computers on the network,
s/he can move on to cataloguing the
devices. These can include printers,
fax machines, routers, access points,
network storage and any other device
that has connectivity with the network.
Once this is done, the network audit
would be complete, but the data will
now need to be analyzed. Is any machine running unauthorized software or
hardware? Is any machine lacking necessary patches? After these and other
relevant questions to each specific network are addressed and machines that
weren’t up to standard are brought in line, the administrator now has an
effective security/inventory baseline for all machines on the network.
ERP Software Consulting Implementation Project Management
Inspace ERP & software or IT consulting and IPM service is a full-fledged
hand holding program which encompasses the following:
Identifying the Product/vendor based on business need/budget
Creating a roadmap for implementation
Create a Project Management Office Team (PMO) to implement as per roadmap
Facilitate and train the users on the adoption of new technology through Change
Management process
What is ERP Consulting ?
Inspace selects a few ERP products and
solutions that are available in the market,
suitable for the clients business needs and
evaluate them to be used by the client,
based on the technological environment.
Process
The IT infrastructure is studied and the
business process of the client is
understood before implementation.
Requirements are analysed and documented. The project scope is defined. Then
different products and solutions are analysed meticulously and the process for
the chosen products goes through several steps before implementation. The
basic functionality of the product and the technology on which the product is
based are considered.
The vendor who supplies the product/solution is minutely scanned and checked
for efficiency and reliability of product delivery. The prices of different products
and solutions are also examined in great detail and the best deal is obtained for
the clients for implementation.
Technology Audit
What is Technology Audit?
Technology Audit which is an auditing service
done to understand the present technology
utilization level of an organization. This is very
similar to an Accounting Audit that is conducted
in almost every company. It provides a
benchmark for, where the business is now, in
terms of technology. The audit can help identify
strengths and weaknesses. It's really a snapshot of the organization's technology
infrastructure. The evaluation of the collected evidence determines if the
information technology is operating effectively and efficiently to achieve the
organization's business goals or objectives.
Why we need to do Technology Audit?
The Technology Audit for
organizations from any domain is
a MUST to ensure optimum
performance in the day to day
operations and decision making. It
helps the organization to
understand and utilize technology
MORE EFFECTIVELY. The
success of this Audit is that it does
not recommend investing more;
rather it helps to get more out of
existing technology investments.
Our Technology Audit includes various components and addresses the critical
and major pain points of different IT areas as detailed below:
Power Infrastructure Audit
 Sudden power failure of UPS
 Over-utilisation and under-
utilisation of UPS capacity
 UPS power cabling issues
 Battery backup for the load
applied
 Climate control measures taken
up for the UPS and Battery placement
 Fire Hazards that pose a potential threat to the environment.
Audit Recommendations
 Safe and Climate
controlled placement of
UPS & Batteries
 Overloading or Under
loading of UPS
 Possible resolution of
UPS issues
Network Infrastructure Audit
 Network speed drops
 Sudden connectivity failure with
devices
 Wireless signal strength issues
 Network architecture and design
 Cable routing and type of cables
being utilised
 Active and passive network
components
Audit Recommendations:
 Network architecture &design as per best practices
 Cabling standards and routing
 Network equipment safe placement & environment
 Active & Passive (wired & wireless) components maintenance
 High-availability setup for minimal downtime
 Possible resolution of network performance issues
Internet/Intranet Connectivity Audit
 Internet connectivity speed drops
 Failover and load-balancing setup
 Bandwidth utilisation
 Unauthorised usage of internet services
 Content filtering to avoid certain
categories of websites
 Firewall setup (policies for
allowing/disallowing the users access to
websites)
 Email services (unauthorised sending of
emails, blocking of attachments,
controlling size or type of attachments).
Audit Recommendations:
 Internet bandwidth usage &
requirements
 Restriction of Unauthorised bandwidth usage
 Load balancing& failover configuration
 Email filtering for data monitoring
 Firewall policies for optimal security
Server, Storage & Backup
Infrastructure Audit
equipment for optimum
 Increased downtime of servers,
 Recovery from crash (both physical and
virtual),
 Storage space management,
 Operating system compatibility issues,
 Automated backup and restoration of the
backed-up data
 Performance of server, storage and backup
operations
Audit Recommendations:
 Optimal configuration for servers based on the user load
 Storage technology and space based on usage and forecast
 Best practices Backup and Restoration process
 Maintenance of Server equipment for minimal downtime
 Possible resolution of server, storage and backup issues
Desktop, Laptop & Thin Clients Audit
 Recovery from crashes and minimising the downtime
 Repair / replacement and upgrade
spares availability
 Standard hardware configuration
across the organisation
 End-to-end audit or sampling audit
can be scoped as required.
Audit Recommendations:
 Optimal configuration for
desktops/laptops based on the usage parameters
 Maintenance of desktop/laptop including spares as per best practices
 Asset tagging & maintenance
 Possible resolution of desktop/laptop issues.
Core Application (ERP /
SW) Audit
 Using MS Excel to take reports after
investing in ERP,
 Utilisation levels of the Application by
users (module-wise)
 Scope for improvement areas
 Functional audit on the mapping the
business requirement with the
functionality
 Technical audit on the coding (coding
standards and best practices).
Audit Recommendations:
 Fitment of the existing application vis-à-vis the business process
 Utilisation levels of existing application department/module-wise
 Module-wise recommendations for optimal usage
 Technical architecture & design as per best practices
 Coding methodology as per best practices
SW License Compliance Audit
 Unauthorised usage of software by staff
 Legal compliance issue due to pirated
applications
 Find actual gaps in the license
 Identify open source alternatives to reduce
investments
Audit Recommendations:
 Identification of unlicensed software and gap in available licenses
 Recommendation on open source / freeware alternatives
IT Data Security Audit
 Vulnerable network
 USB / Email data leakage
 Physical security (entry/exit
registering, CCTV surveillance)
security End-to-end Logical
(including VA-PT audits)
 Data and equipment theft
Audit Recommendations:
 Recommendation for mitigating VA-PT Gaps
 Harden Server environment for robust security
 Firewall policy and monitoring
 Recommendations for physical security as per best practices
Key User Audit
 Collective view of the key users driving the
organisation
 Understand training requirements
 Identify the key expectations of majority
stake holders.
Audit Recommendations:
 Key User’s knowledge level for utilising technology investment of company
 Recommendation for areas of training required by key users.
Vulnerability Assessment & Penetration Testing
Vulnerability Assessment services are a series of tests performed on a system to
identify the vulnerability of the system. This is a Security Assessment conducted
to understand the vulnerabilities and by this process the vulnerabilities are
identified and exposed to the security experts who in turn are able to quantify
and prioritise such vulnerabilities.
Basically a vulnerability of a system refers to the inability of the system to
withstand a hostile threat to its environment and
the effects that may be caused by this hostile
attack.
Vulnerability assessment has many things in
common with risk assessment. Wiki states
that assessments are typically performed
according to the following steps:
 Cataloguing assets and capabilities (resources)
in a system
 Assigning quantifiable value (or at least rank
order) and importance to those resources
 Identifying the vulnerabilities or potential threats
to each resource
 Mitigating or eliminating the most serious vulnerabilities for the most valuable
resources
Penetration Test (PT)
Penetration Tests are different from
vulnerability assessment services, in that
they simulate an actual attack on a
computer system or network as it would
have been from an external or internal
threat. By this method we are able to
evaluate the computer or network's security
levels based on the defined objective of the
test. Thus a vulnerability penetration test
can help determine whether a system is
vulnerable to attack, if the defences were
sufficient and which defences (if any) were defeated in the penetration
test.
Why VA-PT is required?
As new technologies emerge and change the IT scenarios, newer audit security
challenges are given to be faced by corporates. Thus the business that do
transaction over the internet are at high risk, though other companies are also at
risk when being exposed to
external networks. Thus many
unforeseen traps with multiple
vulnerabilities and numerous
threats do manifest themselves in
the least expected time and at the
least expected place. Thus in order
to take-up such challenges and
address then, a robust system with
appropriate security policies,
adequate controls, periodic review
and monitoring are to be in place
to protect the organisation's
information assets. Hence it is
highly recommended to carry out
an indepth Network Assessment comprising of VA-PT audits in a periodic
manner to ensure software compliance to controls established and the policies
set in the organisation and further to evaluate whether they are adequate to
address all the threats.
What Do We Gain by VA-PT?
 In-depth testing of IT infrastructure leads
to understanding of the effectiveness of
security systems in place
 Testing the ability of network defenders to
successfully detect and respond to the
attacks
 Enables planned investment to secure the
IT setup resulting in better ROI
 Helps to identify the security gaps and
secure them
 Focus and prioritise high-risk and threats rather than false encounters
 Optional Software Assessment to understand the vulnerabilities within
 Process and policy in place helps to run regular and periodic tests
 Assessing the magnitude of potential business and operational impacts of
successful attacks

More Related Content

What's hot

The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
Adetula Bunmi
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
Cicero Ray Rufino
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
Dinesh O Bareja
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
Cheng Olayvar
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
Damilola Mosaku
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
pramod_kmr73
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
Jayesh Daga
 
IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
Peter Razenberg
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
kzoe1996
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10
Ed Tobias
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
kzoe1996
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
Mulyadi Yusuf
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
Salih Islam
 
Integrated Test Facility
Integrated Test FacilityIntegrated Test Facility
Integrated Test Facility
kzoe1996
 

What's hot (20)

The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10Internal Control And Fraud 11-19-10
Internal Control And Fraud 11-19-10
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Integrated Test Facility
Integrated Test FacilityIntegrated Test Facility
Integrated Test Facility
 

Similar to Technology Audit | IT Audit | ERP Audit | Database Security

Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
Arish Roy
 
Remote Access Device Monitoring.docx
Remote Access Device Monitoring.docxRemote Access Device Monitoring.docx
Remote Access Device Monitoring.docx
TheWalkerGroup1
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
DevLabs Global
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
Konverge Technologies Pvt. Ltd.
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
lloyd barnette
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
Grace Stone
 
How to build management information system
How to build management information systemHow to build management information system
How to build management information system
North South University
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
JED Consulting Services LLC
 
NuvoSys Solutions, LLC
NuvoSys Solutions, LLCNuvoSys Solutions, LLC
NuvoSys Solutions, LLC
nygonz
 
The Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdfThe Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdf
jvinay0898
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
SharumathiR1
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a

Similar to Technology Audit | IT Audit | ERP Audit | Database Security (20)

Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Remote Access Device Monitoring.docx
Remote Access Device Monitoring.docxRemote Access Device Monitoring.docx
Remote Access Device Monitoring.docx
 
How to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your businessHow to choose the best IT infrastructure monitoring tool for your business
How to choose the best IT infrastructure monitoring tool for your business
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
 
How to build management information system
How to build management information systemHow to build management information system
How to build management information system
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
NuvoSys Solutions, LLC
NuvoSys Solutions, LLCNuvoSys Solutions, LLC
NuvoSys Solutions, LLC
 
The Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdfThe Power of Network Automation Tools.pdf
The Power of Network Automation Tools.pdf
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 

More from Arish Roy

Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
Arish Roy
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter connect - Sep 2016
Newsletter connect - Sep 2016Newsletter connect - Sep 2016
Newsletter connect - Sep 2016
Arish Roy
 
Newsletter Connect - August 2016
Newsletter Connect - August 2016Newsletter Connect - August 2016
Newsletter Connect - August 2016
Arish Roy
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
Arish Roy
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
Arish Roy
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
Arish Roy
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
Arish Roy
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
Arish Roy
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
Arish Roy
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
Arish Roy
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
Arish Roy
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
Arish Roy
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
Arish Roy
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
Arish Roy
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
Arish Roy
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
Arish Roy
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
Arish Roy
 

More from Arish Roy (20)

Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter connect - Sep 2016
Newsletter connect - Sep 2016Newsletter connect - Sep 2016
Newsletter connect - Sep 2016
 
Newsletter Connect - August 2016
Newsletter Connect - August 2016Newsletter Connect - August 2016
Newsletter Connect - August 2016
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
 

Recently uploaded

按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
1jtj7yul
 
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
u0g33km
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
nudduv
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
aozcue
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
uyesp1a
 
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
byfazef
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
aozcue
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
peuce
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
eydeofo
 
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
kuehcub
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
1jtj7yul
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
zpc0z12
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
nudduv
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
2g3om49r
 
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
xuqdabu
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
andreassenrolf537
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Peter Gallagher
 
Production.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd ddddddddddddddddddddddddddddddddddProduction.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd dddddddddddddddddddddddddddddddddd
DanielOliver74
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
8db3cz8x
 
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDARLORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
lorraineandreiamcidl
 

Recently uploaded (20)

按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
按照学校原版(SUT文凭证书)斯威本科技大学毕业证快速办理
 
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
 
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
按照学校原版(Columbia文凭证书)哥伦比亚大学毕业证快速办理
 
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
一比一原版(Greenwich文凭证书)格林威治大学毕业证如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
 
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
 
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
一比一原版(Monash文凭证书)莫纳什大学毕业证如何办理
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
 
Production.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd ddddddddddddddddddddddddddddddddddProduction.pptxd dddddddddddddddddddddddddddddddddd
Production.pptxd dddddddddddddddddddddddddddddddddd
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
 
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDARLORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
 

Technology Audit | IT Audit | ERP Audit | Database Security

  • 1. INSPACE TECHNOLOGIES IT audit (information technology audit) An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations. Information technology audits determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business's overall goals. IT auditors examine not only physical security controls, but also overall business and financial controls that involve information technology systems. Because operations at modern companies are increasingly computerized, IT audits are used to ensure information- related controls and processes are working properly. The primary objectives of an IT audit include. Evaluate the systems and processes in place that secure company data. Determine risks to a company's information assets, and help identify methods to minimize those risks. Ensure information management processes are in compliance with IT-specific laws, policies and standards. Determine inefficiencies in IT systems and associated management.
  • 2. IT Infrastructure IT infrastructure refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment. It allows an organization to deliver IT solutions and services to its employees, partners and/or customers and is usually internal to an organization and deployed within owned facilities. Techopedia explains IT Infrastructure IT infrastructure consists of all components that somehow play a role in overall IT and IT-enabled operations. It can be used for internal business operations or developing customer IT or business solutions. Typically, a standard IT infrastructure consists of the following components: Hardware: Servers, computers, data centers, switches, hubs and routers, and other equipment Software: Enterprise resource planning (ERP), customer relationship management (CRM), productivity applications and more Network: Network enablement, internet connectivity, firewall and security Meat ware: Human users, such as network administrators (NA), developers, designers and end users with access to any IT appliance or service are also part of an IT infrastructure, specifically with the advent of user-centric IT service development.
  • 3. Network Auditing Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware to the network infrastructure. Even worse, it is not the first time a user would install software they need without informing the administrator. These activities can have drastic repercussions on network security. To solve this, an administrator needs to perform regular network auditing and monitor any changes to the preset baseline. Network auditing is a process in which your network is mapped both in terms of software and hardware. The process can be daunting if done manually, but luckily some tools can help automate a large part of the process. The administrator needs to know what machines and devices are connected to the network. He should also know what operating systems are running and to what service pack/patch level. Another point on the checklist should be what user accounts and groups are on each machine as well as what shares are available and to whom. A good network audit will also include what hardware makes up each machine, what policies affect that machine and whether it is a physical or a virtual machine. The more detailed the specification the better. Once the machines running on our network are mapped, the administrator should then move to audit what software is running on each of the machines. This can be done manually, through an application, or simply asking each machine owner to run a script that
  • 4. would automatically catalogue applications and send the administrator an email with a report of the software installed. After the software inventory is done, the process can then catalogue the services which are installed, which are running and which are stopped. The audit for the machines can be finalized by noting which ports each machine listens on and what software is actually running at the time of the audit. Once the administrator concludes auditing the computers on the network, s/he can move on to cataloguing the devices. These can include printers, fax machines, routers, access points, network storage and any other device that has connectivity with the network. Once this is done, the network audit would be complete, but the data will now need to be analyzed. Is any machine running unauthorized software or hardware? Is any machine lacking necessary patches? After these and other relevant questions to each specific network are addressed and machines that weren’t up to standard are brought in line, the administrator now has an effective security/inventory baseline for all machines on the network. ERP Software Consulting Implementation Project Management Inspace ERP & software or IT consulting and IPM service is a full-fledged hand holding program which encompasses the following: Identifying the Product/vendor based on business need/budget Creating a roadmap for implementation Create a Project Management Office Team (PMO) to implement as per roadmap Facilitate and train the users on the adoption of new technology through Change Management process
  • 5. What is ERP Consulting ? Inspace selects a few ERP products and solutions that are available in the market, suitable for the clients business needs and evaluate them to be used by the client, based on the technological environment. Process The IT infrastructure is studied and the business process of the client is understood before implementation. Requirements are analysed and documented. The project scope is defined. Then different products and solutions are analysed meticulously and the process for the chosen products goes through several steps before implementation. The basic functionality of the product and the technology on which the product is based are considered. The vendor who supplies the product/solution is minutely scanned and checked for efficiency and reliability of product delivery. The prices of different products and solutions are also examined in great detail and the best deal is obtained for the clients for implementation. Technology Audit What is Technology Audit? Technology Audit which is an auditing service done to understand the present technology utilization level of an organization. This is very similar to an Accounting Audit that is conducted in almost every company. It provides a benchmark for, where the business is now, in terms of technology. The audit can help identify strengths and weaknesses. It's really a snapshot of the organization's technology infrastructure. The evaluation of the collected evidence determines if the
  • 6. information technology is operating effectively and efficiently to achieve the organization's business goals or objectives. Why we need to do Technology Audit? The Technology Audit for organizations from any domain is a MUST to ensure optimum performance in the day to day operations and decision making. It helps the organization to understand and utilize technology MORE EFFECTIVELY. The success of this Audit is that it does not recommend investing more; rather it helps to get more out of existing technology investments. Our Technology Audit includes various components and addresses the critical and major pain points of different IT areas as detailed below: Power Infrastructure Audit  Sudden power failure of UPS  Over-utilisation and under- utilisation of UPS capacity  UPS power cabling issues  Battery backup for the load applied  Climate control measures taken up for the UPS and Battery placement  Fire Hazards that pose a potential threat to the environment.
  • 7. Audit Recommendations  Safe and Climate controlled placement of UPS & Batteries  Overloading or Under loading of UPS  Possible resolution of UPS issues Network Infrastructure Audit  Network speed drops  Sudden connectivity failure with devices  Wireless signal strength issues  Network architecture and design  Cable routing and type of cables being utilised  Active and passive network components Audit Recommendations:  Network architecture &design as per best practices  Cabling standards and routing  Network equipment safe placement & environment  Active & Passive (wired & wireless) components maintenance  High-availability setup for minimal downtime
  • 8.  Possible resolution of network performance issues Internet/Intranet Connectivity Audit  Internet connectivity speed drops  Failover and load-balancing setup  Bandwidth utilisation  Unauthorised usage of internet services  Content filtering to avoid certain categories of websites  Firewall setup (policies for allowing/disallowing the users access to websites)  Email services (unauthorised sending of emails, blocking of attachments, controlling size or type of attachments). Audit Recommendations:  Internet bandwidth usage & requirements  Restriction of Unauthorised bandwidth usage  Load balancing& failover configuration  Email filtering for data monitoring  Firewall policies for optimal security Server, Storage & Backup Infrastructure Audit equipment for optimum  Increased downtime of servers,  Recovery from crash (both physical and virtual),  Storage space management,  Operating system compatibility issues,  Automated backup and restoration of the backed-up data  Performance of server, storage and backup operations Audit Recommendations:
  • 9.  Optimal configuration for servers based on the user load  Storage technology and space based on usage and forecast  Best practices Backup and Restoration process  Maintenance of Server equipment for minimal downtime  Possible resolution of server, storage and backup issues Desktop, Laptop & Thin Clients Audit  Recovery from crashes and minimising the downtime  Repair / replacement and upgrade spares availability  Standard hardware configuration across the organisation  End-to-end audit or sampling audit can be scoped as required. Audit Recommendations:  Optimal configuration for desktops/laptops based on the usage parameters  Maintenance of desktop/laptop including spares as per best practices  Asset tagging & maintenance  Possible resolution of desktop/laptop issues. Core Application (ERP / SW) Audit  Using MS Excel to take reports after investing in ERP,  Utilisation levels of the Application by users (module-wise)  Scope for improvement areas  Functional audit on the mapping the business requirement with the functionality  Technical audit on the coding (coding
  • 10. standards and best practices). Audit Recommendations:  Fitment of the existing application vis-à-vis the business process  Utilisation levels of existing application department/module-wise  Module-wise recommendations for optimal usage  Technical architecture & design as per best practices  Coding methodology as per best practices SW License Compliance Audit  Unauthorised usage of software by staff  Legal compliance issue due to pirated applications  Find actual gaps in the license  Identify open source alternatives to reduce investments Audit Recommendations:  Identification of unlicensed software and gap in available licenses  Recommendation on open source / freeware alternatives IT Data Security Audit  Vulnerable network  USB / Email data leakage  Physical security (entry/exit registering, CCTV surveillance) security End-to-end Logical (including VA-PT audits)  Data and equipment theft
  • 11. Audit Recommendations:  Recommendation for mitigating VA-PT Gaps  Harden Server environment for robust security  Firewall policy and monitoring  Recommendations for physical security as per best practices Key User Audit  Collective view of the key users driving the organisation  Understand training requirements  Identify the key expectations of majority stake holders. Audit Recommendations:  Key User’s knowledge level for utilising technology investment of company  Recommendation for areas of training required by key users. Vulnerability Assessment & Penetration Testing Vulnerability Assessment services are a series of tests performed on a system to identify the vulnerability of the system. This is a Security Assessment conducted to understand the vulnerabilities and by this process the vulnerabilities are identified and exposed to the security experts who in turn are able to quantify and prioritise such vulnerabilities.
  • 12. Basically a vulnerability of a system refers to the inability of the system to withstand a hostile threat to its environment and the effects that may be caused by this hostile attack. Vulnerability assessment has many things in common with risk assessment. Wiki states that assessments are typically performed according to the following steps:  Cataloguing assets and capabilities (resources) in a system  Assigning quantifiable value (or at least rank order) and importance to those resources  Identifying the vulnerabilities or potential threats to each resource  Mitigating or eliminating the most serious vulnerabilities for the most valuable resources Penetration Test (PT) Penetration Tests are different from vulnerability assessment services, in that they simulate an actual attack on a computer system or network as it would have been from an external or internal threat. By this method we are able to evaluate the computer or network's security levels based on the defined objective of the test. Thus a vulnerability penetration test can help determine whether a system is vulnerable to attack, if the defences were sufficient and which defences (if any) were defeated in the penetration test.
  • 13. Why VA-PT is required? As new technologies emerge and change the IT scenarios, newer audit security challenges are given to be faced by corporates. Thus the business that do transaction over the internet are at high risk, though other companies are also at risk when being exposed to external networks. Thus many unforeseen traps with multiple vulnerabilities and numerous threats do manifest themselves in the least expected time and at the least expected place. Thus in order to take-up such challenges and address then, a robust system with appropriate security policies, adequate controls, periodic review and monitoring are to be in place to protect the organisation's information assets. Hence it is highly recommended to carry out an indepth Network Assessment comprising of VA-PT audits in a periodic manner to ensure software compliance to controls established and the policies set in the organisation and further to evaluate whether they are adequate to address all the threats. What Do We Gain by VA-PT?  In-depth testing of IT infrastructure leads to understanding of the effectiveness of security systems in place  Testing the ability of network defenders to successfully detect and respond to the attacks  Enables planned investment to secure the IT setup resulting in better ROI  Helps to identify the security gaps and secure them
  • 14.  Focus and prioritise high-risk and threats rather than false encounters  Optional Software Assessment to understand the vulnerabilities within  Process and policy in place helps to run regular and periodic tests  Assessing the magnitude of potential business and operational impacts of successful attacks