Auditing Your Windows Infrastructure, Intranet And Internet Security: A Practical Audit Program for Assurance Professionals

Nonfiction, Computers, Operating Systems, Windows, Application Software, Computer Security
Cover of the book Auditing Your Windows Infrastructure, Intranet And Internet Security: A Practical Audit Program for Assurance Professionals by Nwabueze Ohia, Nwabueze Ohia
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Nwabueze Ohia ISBN: 9781370743247
Publisher: Nwabueze Ohia Publication: January 21, 2018
Imprint: Smashwords Edition Language: English
Author: Nwabueze Ohia
ISBN: 9781370743247
Publisher: Nwabueze Ohia
Publication: January 21, 2018
Imprint: Smashwords Edition
Language: English

The in-depth, authoritative reference for intermediate to advanced IT Audit and IT Security professionals.
Following reports of Denial-of-Service attacks and data breaches on large corporation around the world in recent times and its attendant impact on business operations, the need to ensure security of the intranet and internet environment cannot be overemphasized. Considering the widespread use of Windows Operating Systems and other associated services, there is obvious need to ensure security of Windows infrastructure by implementing standard configurations, good internal control systems, enterprise policies as well as promotion of best practices and user awareness within the operating environment. Auditors and other IT Assurance professionals are duty bound to ensure the security of all enterprise systems by instituting a robust internal audit and security assessment process for continuous improvement of good security practices.

“Auditing Your Windows Infrastructure, Intranet and Internet Security” by Nwabueze Ohia provides insight to IT Assurance professionals (Information Systems Auditors, Information Systems Controllers, IT/IS Security and IT/IS Risk professionals) on how to successfully conduct audit or security review of Windows infrastructure, intranet and internet environment of their organizations. It first highlighted some of the risks, vulnerabilities, and process/control lapses associated with some Windows systems, Email Infrastructure (Exchange Server) and Active Directory/Domain Controller Infrastructure and how they can impact the security of intranet environment of organizations. This is important to raise the awareness of the reader on inherent risks/vulnerabilities associated with the Windows Infrastructure. Thereafter, it then highlighted the steps to carrying out the audit testing to verify the effectiveness or otherwise of controls around the following; Active Directory/Domain Controller, Exchange Server, TMG/ISA Server, Windows Servers and Workstations, Skype for Business Server, Virtualization Server and DNS Servers. This exhaustive and comprehensive audit program provides a step by step guide on assessing the effectiveness of controls in an organization’s intranet and internet to ensure security.

The book identified vulnerabilities inherent in Windows infrastructure (servers and services) in conjunction with their implications on confidentiality, integrity and availability of information assets. Detailed audit test procedure to verify the effectiveness of controls build around the system were provided in the book. The audit program covered enterprise policies (IT Security policy, password policy, acceptable use of computer assets policy, network policy, etc.), system administration, security baseline configuration for Windows infrastructure, logical access control and authentication, group policy object (GPO) settings, change management, enterprise log management and correlation, patch management, data loss prevention/endpoint management, vulnerability management, virus control, virtualization, instant messaging and email services, backup and archiving services, spam control, bring-you-own-device policy and administration, among others.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The in-depth, authoritative reference for intermediate to advanced IT Audit and IT Security professionals.
Following reports of Denial-of-Service attacks and data breaches on large corporation around the world in recent times and its attendant impact on business operations, the need to ensure security of the intranet and internet environment cannot be overemphasized. Considering the widespread use of Windows Operating Systems and other associated services, there is obvious need to ensure security of Windows infrastructure by implementing standard configurations, good internal control systems, enterprise policies as well as promotion of best practices and user awareness within the operating environment. Auditors and other IT Assurance professionals are duty bound to ensure the security of all enterprise systems by instituting a robust internal audit and security assessment process for continuous improvement of good security practices.

“Auditing Your Windows Infrastructure, Intranet and Internet Security” by Nwabueze Ohia provides insight to IT Assurance professionals (Information Systems Auditors, Information Systems Controllers, IT/IS Security and IT/IS Risk professionals) on how to successfully conduct audit or security review of Windows infrastructure, intranet and internet environment of their organizations. It first highlighted some of the risks, vulnerabilities, and process/control lapses associated with some Windows systems, Email Infrastructure (Exchange Server) and Active Directory/Domain Controller Infrastructure and how they can impact the security of intranet environment of organizations. This is important to raise the awareness of the reader on inherent risks/vulnerabilities associated with the Windows Infrastructure. Thereafter, it then highlighted the steps to carrying out the audit testing to verify the effectiveness or otherwise of controls around the following; Active Directory/Domain Controller, Exchange Server, TMG/ISA Server, Windows Servers and Workstations, Skype for Business Server, Virtualization Server and DNS Servers. This exhaustive and comprehensive audit program provides a step by step guide on assessing the effectiveness of controls in an organization’s intranet and internet to ensure security.

The book identified vulnerabilities inherent in Windows infrastructure (servers and services) in conjunction with their implications on confidentiality, integrity and availability of information assets. Detailed audit test procedure to verify the effectiveness of controls build around the system were provided in the book. The audit program covered enterprise policies (IT Security policy, password policy, acceptable use of computer assets policy, network policy, etc.), system administration, security baseline configuration for Windows infrastructure, logical access control and authentication, group policy object (GPO) settings, change management, enterprise log management and correlation, patch management, data loss prevention/endpoint management, vulnerability management, virus control, virtualization, instant messaging and email services, backup and archiving services, spam control, bring-you-own-device policy and administration, among others.

More books from Computer Security

Cover of the book Information Security Theory and Practice by Nwabueze Ohia
Cover of the book Designing Hyper-V Solutions by Nwabueze Ohia
Cover of the book Bitcoin for the Befuddled by Nwabueze Ohia
Cover of the book Advances in User Authentication by Nwabueze Ohia
Cover of the book Cloud First Adoption by Nwabueze Ohia
Cover of the book Security-Aware Design for Cyber-Physical Systems by Nwabueze Ohia
Cover of the book Concise Guide to CompTIA Security + by Nwabueze Ohia
Cover of the book Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications by Nwabueze Ohia
Cover of the book Private Security and the Law by Nwabueze Ohia
Cover of the book Comptia Security+ Primer by Nwabueze Ohia
Cover of the book Proceedings of International Ethical Hacking Conference 2018 by Nwabueze Ohia
Cover of the book SAP Security Interview Questions, Answers, and Explanations by Nwabueze Ohia
Cover of the book Data Breach Preparation and Response by Nwabueze Ohia
Cover of the book Investigating the Cyber Breach by Nwabueze Ohia
Cover of the book How To Protect Your Personal Computer: Your Step-By-Step Guide To Fight Spyware, Viruses, & Malware by Nwabueze Ohia
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy