A company planned to expand the Information Management & Security faculty of the business organisation and offered you the position of Information Systems & Security Auditor. Your role among other things is to ensure that the organisation’s systems and all IT Infrastructure comply with all known global Information Systems and Security Standards. As a security measure, the organisation is required to ensure that its Information Systems infrastructure, procedures and processes comply, and are properly registered with International Standards organisations like the ISO, among others. The business intends to always ensure that all systems and infrastructure are well protected and have acquired a high level of resilience in the event of a cyberattack of any kind or any act of fraud that may be attempted on the organisation as a prime target either by internal or external perpetrators. QUESTION 1.1 Based on the above scenario, break down the information security audit function into six major functional areas which are universally accepted and discuss each functional area in detail providing real life system examples where necessary. QUESTION 1.2 Consider a security auditing system and analyse the architecture of that security auditing system. Explain in detail what mechanisms your chosen system uses to process audit events specifically in terms of the five factors of event screening, event recording, alarm processing, audit trail generation and audit analysis.

icon
Related questions
Question

A company planned to expand the Information Management & Security faculty of the business organisation and offered you the position of Information Systems & Security Auditor. Your role among other things is to ensure that the organisation’s systems and all IT Infrastructure comply with all known global Information Systems and Security Standards. As a security measure, the organisation is required to ensure that its Information Systems infrastructure, procedures and processes comply, and are properly registered with International Standards organisations like the ISO, among others. The business intends to always ensure that all systems and infrastructure are well protected and have acquired a high level of resilience in the event of a cyberattack of any kind or any act of fraud that may be attempted on the organisation as a prime target either by internal or external perpetrators.

QUESTION 1.1

Based on the above scenario, break down the information security audit function into six major functional areas which are universally accepted and discuss each functional area in detail providing real life system examples where necessary.

QUESTION 1.2

Consider a security auditing system and analyse the architecture of that security auditing system. Explain in detail what mechanisms your chosen system uses to process audit events specifically in terms of the five factors of event screening, event recording, alarm processing, audit trail generation and audit analysis.

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer