Here is the synopsis of our sample research paper on AUDITING INFORMATIONAL SYSTEMS FOR SECURITY. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3-page paper discusses the steps necessary for auditing an information system. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: AS43_MTorgaaudi.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
has become an organizational priority (Network Security Auditing Solutions, 2009). But before patches or fixes can be put on an organizations information systems networks, servers or anything else, the system
must first be audited. Trying to put fixes on a system or protecting a system without knowing whats wrong with it is simply a waste of time, sense and money.
This is where security auditing comes in. In its most basic form, security auditing is defined as establishing an effective process to determine
security vulnerabilities so they can be fixed priority (Network Security Auditing Solutions, 2009). So a security audit is done, not to protect a system, but to turn up vulnerabilities.
In doing so, its hoped that the right corrections can be found to help strengthen the system. An organizational information system can be
defined as an integrated social system of various people who use information to perform activity that has a purpose (Gasson, 2004). For purposes of this paper, well also assume that
computer-based technology is used to help provide information and to help these people perform their tasks (Gasson, 2004). Basically, the design and implementation of information systems cant be completed
in isolation from the organization or its processes (Gasson, 2004). This means that any kind of security audit would have to take in all factors of the organizational information system.
Certainly, the technological/hardware/software aspects of the system need to be examined and studied. But just as important are the people using the
hardware and software. Understanding and monitoring human behavior (such as keeping passwords in open site of computer terminals or overhearing passwords given out over the phone), is an excellent way
...