
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 140
Eachnetworkshouldbetestedfrom theinternal usernetworks toensurethatsafety
existsinternally,thatmaliciousattemptsfromtheinternalusersarebeingrestricted.
Eachinstalledsecurityconfigurationthatistobetestedmustfirstbereviewedto
determinetheservicepacks/patchesstatus.Thesettingsmustbecomparedwiththe
latestlistofvulnerabilitiestoseeiffurtheractionisnecessary.
Phrase3– Technical Assessmentfroman“Outsider”perspective
Inthisphrasewewillactliketheoutsidehackerswhotrytofindwaysintoour
privatenetwork. Again,eachinstalledsecurityconfigurationthatistobetestedmust
firstbereviewedtodeterminetheservicepacks/patchesstatus.Thesettingsmustbe
comparedwiththelatestlistofvulnerabilitiestoseeiffurtheractionisnecessary.
Phrase4– AdministrativeAssessmentandFaultToleranceAssessment
Inthisphrasewefocusonauditingthe“admin”aspectofthesecuritysolutionsin
place,aswellastoreviewthecurrentleveloffaulttolerance.
Phrase5–ReportPreparation
Inthisphraseweprepareareporton thefindingsandrecommendations.Thisreport
willbesubmittedto themanagement.
Phrase6–Followup
Inthisphrasewefollowuptoensure thatanyidentifiedshortcomingistobetaken
careof.
Asauditors,wedoNOTfixtheproblemsourselves.Instead,weidentifythe
problemsandgiverecommendationstotheauditee.
Coordination,StaffingandSchedule
Weneedtocompletetheauditeffectivelywithoutintroducingsignificantdisruptionto
thedailyoperations.Atthesametime,wedonotwanttoincuranextraordinary large
expenseforthispurpose.Theidealarrangementinthiscaseis:
Kommentare zu diesen Handbüchern