SlideShare ist ein Scribd-Unternehmen logo
1 von 70
IT Audit and Forensics  Proposed Training Plan for Tribal Internal Audit Prepared by John Donnelly
Training Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The IT Risk Assessment   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The IT Risk Assessment ,[object Object],[object Object]
The IT Risk Assessment ,[object Object],[object Object],[object Object],[object Object]
Senior Management  Decide to Change ,[object Object],[object Object],[object Object]
Direct Change ,[object Object],[object Object],[object Object],[object Object],[object Object]
Support Change ,[object Object],[object Object],[object Object]
Benefits of Change ,[object Object],[object Object],[object Object],[object Object]
The IT Risk Assessment ,[object Object],[object Object],[object Object]
IT Risk Assessment ,[object Object],[object Object],[object Object],[object Object]
Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Procedures ,[object Object],[object Object],[object Object],[object Object]
Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Management Practices ,[object Object],[object Object],[object Object],[object Object]
Organizational Structure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A New Approach to  General Controls ,[object Object],[object Object],[object Object],[object Object],[object Object]
A New Approach to  General Controls ,[object Object],[object Object]
A New Approach to  General Controls ,[object Object],[object Object],[object Object]
Protection of Information Assets ,[object Object],[object Object],[object Object],[object Object],[object Object]
Importance of Information Security Management ,[object Object],[object Object],[object Object],[object Object]
Key Elements of Information Security Management ,[object Object],[object Object],[object Object],[object Object]
Key Elements of Information Security Management:  Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Classification ,[object Object],[object Object],[object Object]
System Access ,[object Object],[object Object],[object Object]
Information Security  Management Standards ,[object Object],[object Object],[object Object],[object Object]
Risk Management Domains ,[object Object],[object Object]
Risk Management Domains ,[object Object],[object Object]
Risk Management Domains ,[object Object]
Network Control and Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Management  Systems Review ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Administration ,[object Object],[object Object],[object Object],[object Object]
Network Administration ,[object Object],[object Object],[object Object],[object Object]
Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Security ,[object Object],[object Object],[object Object]
Network Terminal  Expansion System ,[object Object],[object Object],[object Object]
Network Control and Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditing Wireless Networks ,[object Object],[object Object],[object Object]
Introduction to the  Wireless Community ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Internet ,[object Object],[object Object],[object Object]
How Wireless Access Protocol Works ,[object Object],[object Object],[object Object],[object Object]
Why WAP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WAP Security ,[object Object],[object Object]
WAP Security ,[object Object],[object Object],[object Object]
Internet Security ,[object Object],[object Object],[object Object],[object Object]
Operating Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control and Security of Unix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding UNIX ,[object Object]
Learning about UNIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Learning about UNIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Learning about UNIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditing Windows ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Control and Security ,[object Object],[object Object],[object Object],[object Object]
Internet Control and Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Putting it All together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Risk Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identifying Your Assets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who you need to  be cautious of and why ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frequently Exploited  Ports and Services ,[object Object],[object Object],[object Object],[object Object]
Tools of the Trade ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking your network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Network Devices ,[object Object],[object Object],[object Object],[object Object],[object Object]
Control Check Lists: Routers ,[object Object],[object Object],[object Object]
Control Checklists: Firewalls ,[object Object],[object Object],[object Object],[object Object]
 
What We Do? ,[object Object],[object Object],[object Object]
What we do? ,[object Object],[object Object]
Putting It All Together ,[object Object],[object Object],[object Object]
Putting It all Together ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Computer engineering company
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC CertificationControlCase
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 

Was ist angesagt? (20)

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Security policy
Security policySecurity policy
Security policy
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Role management
Role managementRole management
Role management
 
E1804012536
E1804012536E1804012536
E1804012536
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 

Andere mochten auch

L e s p r o g r a m m a
L e s p r o g r a m m aL e s p r o g r a m m a
L e s p r o g r a m m amicd88
 
Mapa coceptual
Mapa coceptualMapa coceptual
Mapa coceptualray1425
 
San Francisco Digital Identity and Commerce Tour
San Francisco Digital Identity and Commerce TourSan Francisco Digital Identity and Commerce Tour
San Francisco Digital Identity and Commerce TourWhitepages Pro
 
Mapa coceptual
Mapa coceptualMapa coceptual
Mapa coceptualray1425
 
Liberians, remember to vote responsibly
Liberians, remember to vote responsiblyLiberians, remember to vote responsibly
Liberians, remember to vote responsiblyStanley Mcgill
 
Engage your world
Engage your worldEngage your world
Engage your worldmookhrasky
 
How to reprogram your mind to achieve success
How to reprogram your mind to achieve successHow to reprogram your mind to achieve success
How to reprogram your mind to achieve successadameast
 
Pemasaran Email untuk bisnes dari rumah
Pemasaran Email untuk bisnes dari rumahPemasaran Email untuk bisnes dari rumah
Pemasaran Email untuk bisnes dari rumahamendvinfo
 
Fgd rupm provinsi jambi
Fgd rupm provinsi jambiFgd rupm provinsi jambi
Fgd rupm provinsi jambiasholahuddin
 
4 g technology
4 g technology4 g technology
4 g technologyBeena Jain
 
Moveinfo
MoveinfoMoveinfo
Moveinfosww176
 
Formulation of corporate strategy to get successful in rspo and ispo certific...
Formulation of corporate strategy to get successful in rspo and ispo certific...Formulation of corporate strategy to get successful in rspo and ispo certific...
Formulation of corporate strategy to get successful in rspo and ispo certific...Suhardiyoto Haryadi
 

Andere mochten auch (16)

Vanita Resume_kyc
Vanita Resume_kycVanita Resume_kyc
Vanita Resume_kyc
 
L e s p r o g r a m m a
L e s p r o g r a m m aL e s p r o g r a m m a
L e s p r o g r a m m a
 
Mapa coceptual
Mapa coceptualMapa coceptual
Mapa coceptual
 
San Francisco Digital Identity and Commerce Tour
San Francisco Digital Identity and Commerce TourSan Francisco Digital Identity and Commerce Tour
San Francisco Digital Identity and Commerce Tour
 
Nesibe Aydin Dershanesi 2010 Brosur
Nesibe  Aydin  Dershanesi 2010  BrosurNesibe  Aydin  Dershanesi 2010  Brosur
Nesibe Aydin Dershanesi 2010 Brosur
 
Mapa coceptual
Mapa coceptualMapa coceptual
Mapa coceptual
 
Drafts Of Projects
Drafts Of ProjectsDrafts Of Projects
Drafts Of Projects
 
Liberians, remember to vote responsibly
Liberians, remember to vote responsiblyLiberians, remember to vote responsibly
Liberians, remember to vote responsibly
 
Piles treatment homeo
Piles treatment homeoPiles treatment homeo
Piles treatment homeo
 
Engage your world
Engage your worldEngage your world
Engage your world
 
How to reprogram your mind to achieve success
How to reprogram your mind to achieve successHow to reprogram your mind to achieve success
How to reprogram your mind to achieve success
 
Pemasaran Email untuk bisnes dari rumah
Pemasaran Email untuk bisnes dari rumahPemasaran Email untuk bisnes dari rumah
Pemasaran Email untuk bisnes dari rumah
 
Fgd rupm provinsi jambi
Fgd rupm provinsi jambiFgd rupm provinsi jambi
Fgd rupm provinsi jambi
 
4 g technology
4 g technology4 g technology
4 g technology
 
Moveinfo
MoveinfoMoveinfo
Moveinfo
 
Formulation of corporate strategy to get successful in rspo and ispo certific...
Formulation of corporate strategy to get successful in rspo and ispo certific...Formulation of corporate strategy to get successful in rspo and ispo certific...
Formulation of corporate strategy to get successful in rspo and ispo certific...
 

Ähnlich wie It Audit And Forensics

Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Frameworkssuser65fa31
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxTheWalkerGroup1
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingThomas Donofrio
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Ginney McAdams
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Arish Roy
 
Best Practices for Robust IT Network Security
Best Practices for Robust IT Network SecurityBest Practices for Robust IT Network Security
Best Practices for Robust IT Network SecurityITconsultingfirmnj
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran Krishnan
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdfitconsultancynj104
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xguest879489
 

Ähnlich wie It Audit And Forensics (20)

Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
Network management
Network management Network management
Network management
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 
Best Practices for Robust IT Network Security
Best Practices for Robust IT Network SecurityBest Practices for Robust IT Network Security
Best Practices for Robust IT Network Security
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
 
Inspace technologies
Inspace technologiesInspace technologies
Inspace technologies
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 

It Audit And Forensics

  • 1. IT Audit and Forensics Proposed Training Plan for Tribal Internal Audit Prepared by John Donnelly
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.  
  • 67.
  • 68.
  • 69.
  • 70.