2-3 page paper

User Generated

gurtvsg8

Computer Science

Description

To assist LSS, your contract has been expanded to also perform an access control audit.

  • Describe the process needed to perform the audit.
  • Discuss typical devices, or assets, and possible issues associated with auditing a typical network environment (including a database with health care information, an HR database and application, and call center workstations that access information considered to be private).
  • List and describe at least 4 possible examples.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. In case you need edits, feel free to ask.

Running head: AUDITING

1

Control access auditing

Name of student

Name of course

Affiliated institution
Instructor’s name

Date

2

AUDITING
Describe the process needed to perform the audit.

Access control is a necessary step in mitigating the organization's security risks. It is
therefore mandatory to ensure that the auditing process is done as effectively as possible. The
implementation of access control is to ensure that external and internal organization users only
have access to the relevant resources they need in their activities and respective tasks, this
prevents wasting resources which is beneficial to the organization.
For the maximum economic application of the resources through access control, there is a
need for a financial inspection done as an audit. The process needed for an audit control must be
systemic and professional. The ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags