Sample Essay on:
AUDITING INFORMATIONAL SYSTEMS FOR SECURITY

Here is the synopsis of our sample research paper on AUDITING INFORMATIONAL SYSTEMS FOR SECURITY. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3-page paper discusses the steps necessary for auditing an information system. Bibliography lists 3 sources.

Page Count:

3 pages (~225 words per page)

File: AS43_MTorgaaudi.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

has become an organizational priority (Network Security Auditing Solutions, 2009). But before patches or fixes can be put on an organizations information systems networks, servers or anything else, the system must first be audited. Trying to put fixes on a system or protecting a system without knowing whats wrong with it is simply a waste of time, sense and money. This is where security auditing comes in. In its most basic form, security auditing is defined as establishing an effective process to determine security vulnerabilities so they can be fixed priority (Network Security Auditing Solutions, 2009). So a security audit is done, not to protect a system, but to turn up vulnerabilities. In doing so, its hoped that the right corrections can be found to help strengthen the system. An organizational information system can be defined as an integrated social system of various people who use information to perform activity that has a purpose (Gasson, 2004). For purposes of this paper, well also assume that computer-based technology is used to help provide information and to help these people perform their tasks (Gasson, 2004). Basically, the design and implementation of information systems cant be completed in isolation from the organization or its processes (Gasson, 2004). This means that any kind of security audit would have to take in all factors of the organizational information system. Certainly, the technological/hardware/software aspects of the system need to be examined and studied. But just as important are the people using the hardware and software. Understanding and monitoring human behavior (such as keeping passwords in open site of computer terminals or overhearing passwords given out over the phone), is an excellent way ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now