Solved

Audit, security

Posted on 2007-11-21
2
324 Views
Last Modified: 2013-12-06
Taken to extremes, what might become of an organization that does not take the role of IT auditing seriously? What types of vulnerabilities are most common?
0
Comment
Question by:scoobykidd
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 28

Accepted Solution

by:
Jan Springer earned 125 total points
ID: 20329241
First question:  What is your liability of compromised information?  How will recovery impact your company?  Do you have concerns about your server (and clients) being denied access to other servers services (i.e., SMTP)?

Second question: Any running and exposed services, files, scripting, configuration, access
0
 

Author Closing Comment

by:scoobykidd
ID: 31410405
Thanks just needed to think a little deeper.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question