Аудит информационной безопасности: цели, методы и средства, пример. Аудит информационной безопасности банка

Today, almost everybody knows the sacred phrase that the information owner owns the world. That is why in our time everyone is trying to steal confidential information . In this regard, unprecedented steps are being taken to implement means of protection against possible attacks. However, sometimes it may be necessary to conduct an audit of the information security of the enterprise. What is it and why is all this needed, now we’ll try to figure it out.

What is an information security audit in the general definition?

Now we will not touch upon abstruse scientific terms, but try to define for ourselves the basic concepts, describing them in the simplest language (popularly, this could be called an audit for “dummies”).

information security audit




. () - , .

, , , , , , . . , .





, , , , . - . ?

. , , . : . ? : , . , , «» , .

, , :

  • , ( , , , , , , ..);
  • ( , );
  • , ;
  • , ( , , ..).

?

, , .









methods and means of information security audit




, , , , , , , .

, , . . .

audit of bank information security




, , , , , , .. , ( ) . , , (, , .).

. « ». ? , , , , . .

, , :

  • , ;
  • (ISO 17799) , ;
  • , - .

audit of information security in the organization




, . , .

, , . , , , . .

, , , , . :

  • ;
  • , , ;
  • ;
  • - ;
  • , , .

, .

information security audit objectives




:

  • ( , , , );
  • ( , , , , , , ..);
  • ;
  • ( );
  • ;
  • .

, . . .

, , . , , - , , .

information security audit methods




, , ( , , ), (, ..). , , ( , , , ). , .

. :

  • ( , );
  • ( , );
  • , .

. , , . , , , . , , , , .

information security audit example




, . .

, , , , , , , , , .

, .. , . , . «» , , .

information security audit tools




, , . : , ( , , .). . , , . – .

, , . – . , , , , .

:

, , . , , .

, , , , ICQ ( ). . «» . , . - e-mail, .

audit of enterprise information security




? , , Mirabilis, ICQ, ( ). , – .

, ICQ . , . . , . , …

Here is a brief summary of everything related to IP security auditing. Of course, far from all of its aspects are affected here. The reason is only that a lot of factors influence the statement of tasks and methods of its implementation, therefore the approach in each particular case is strictly individual. In addition, the methods and means of auditing information security can be different for different IPs. However, it is thought that the general principles of such checks for many will become clear at least at the initial level.




All Articles