|About the Book|
Now part of almost every major corporation, interconnected networks offer staff members unlimited access to information, regardless of where it is stored. While these open systems make data easy to retrieve for those authorized to do so, it is alsoMoreNow part of almost every major corporation, interconnected networks offer staff members unlimited access to information, regardless of where it is stored. While these open systems make data easy to retrieve for those authorized to do so, it is also a simple matter for hackers and electronic espionage agents to obtain unauthorized entry to your critical data and programs or to take complete control of your network and the servers within it. In fact, so many poorly controlled dial-up and Internet connections are in existence that outsider access has never been so simple or network penetration risk so high. Written by Gordon Smith, a leading expert in the field, this groundbreaking new bookthe first to take an in-depth look at intranets and the Internet from an audit and information systems perspectiveshows you how to guard against potentially costly cyberhazards. With businesses focusing on getting interconnected systems up and running, they often overlook or mishandle the issue of network defenses. As Smith tells us, Operating system controls in the UNIX, NT, and Novell environments in many corporations are so poor that they practically invite hackers to enter the network. Network Auditing provides the tools necessary to detect poorly secured network components and to install strong preventive measures to secure your network. It also provides a sound methodology and practical checklists to identify specific risks facing your network. With clear explanations and practical guidance, youll learn how to identify control issues with carriers, circuits, and routers- audit for cost and efficiency- use control techniques to provide a safe processing environment- apply a Committee of Sponsoring Organizations (COSO) report- and much more. In addition to helpful risk/control tables and checklists, heres where youll find complete details on: Networksearly systems, impact of interconnected networks on business, interconnected audit time schedules, telecommunications glossaryCarrier issuescritical process analysis, cost containment, network contractsCommunications alternativeswire line and broadcast-type circuits, laser and shared communications, integrated services digital networksNetwork operations and managementbusiness continuance, disaster preparedness, maintenance, problem reporting and resolutionCataloging the networkcataloging the wide area network, servers and LANs, the Internet and other public networksAccompanied by a disk that contains auditing programs for either direct use or individual customization, Network Auditing is essential reading for anyone responsible for safeguarding interconnected corporate systems.