Organizational security types


1.       Business Continuance
-          Business have come to recognize that some services of the organization have to be delivered continuously without interruption
-          Create an IT Business Continuity plan( Backup business Plan)
-          Focus on getting the network and systems up and running as quickly as possible.

Business continuity and disaster recovery planning
-          Management leadership, goals and requirements, business impact analysis, team building and implementation

Backup alternatives
-          Hardware and software approaches, electronic vaulting

Recovery and testing
-          Strategies for executing recovery, carrying out drills and types of plan testing
Emergency Response
-          Preserving assets and life, reducing fraud, theft and vandalism

2.       Backup / Restoration of Data
-          When we think of backup, we generally think of secure, offsite tape storage that will be available should we accidentally damage or destroy a needed file.
-          Backup includes site space, hardware, software and people as well as data

3.       Audits
-          Information is shared on network via email, attachment, network drives, which pose dangers as well
-          Attackers can easily exploit the networks if proper security is not available in organization
-          Auditing is an essential part expose loopholes in the network and it should be performed in timely manner
-          To check the security of the network
-          A system evaluation of company’s information security and ensures that the company is following set of criteria for maintaining security of the data

How security audits happen?
Analyze software
Data processors
User practice
System configuration

-          Audit process is an ongoing process of determining and preserving operative security policies and involves every resource of an organization
-          It offers a measurable way to examine the security level of an organization Security auditors perform their task with
-          Vulnerability scanner
-          OS (Operating system) examination
-          Network sharing analysis
-          Personal interviews

4.       Security vulnerability testing
-          Network scanning
-          Vulnerability scanning
-          Password cracking
-          Log review
-          Virus detection
-          Penetration testing



Comments

Popular posts from this blog

Log Review

Network planning - Proof of concept