Solved

what is the 27 point network audit I see on so many websites?

Posted on 2013-01-29
3
248 Views
Last Modified: 2013-04-01
I see a ton of websites that advertise a 27 point audit of the network.  but, I can't find what is included in the 27 points. does anyone know where this list comes from.  there are so many it must be common or created by some audit software.  also, remcommedation of audit software would be appreciated.
Thanks
Dave
0
Comment
Question by:curry199
3 Comments
 
LVL 10

Accepted Solution

by:
ivanovn earned 500 total points
ID: 38861121
I am not familiar with what 27 point network audit includes, and doing a search on it does not provide any information (other than advertisements for it). From a skeptic's perspective, I am inclined to say that the 27 point network audit is just a gimmick. If it was a legitimate process that meant something, it would clearly outline what the 27 points actually are, as well as pass/fail criteria, etc. Since none of that is available, I am guessing it's an advertising gimmick. This is my personal opinion and is by no means official or factually supported answer.
0
 
LVL 17

Expert Comment

by:pergr
ID: 38861289
It looks to me like some sort of Wordpress worm.

Most sites that advertise it has this page in the same type of named directory (free-stuff)...

Perhaps the site owners did not actually put it there. Some sort of phishing?
0
 

Author Comment

by:curry199
ID: 39038968
I've requested that this question be deleted for the following reason:

old
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now