1: Completeness, accuracy and validity of transactions
2: Restricted access to assets and records
IT Process Reviews
Annotations:
1: Change control over existing environments
2: Development / implementation of new systems
3: Security and operations over environment
Penetration Testing
Businesses are increasingly dependent on IT
Increased system vulnerabiilties
Pen testers need to have high integrity, tech skills
Maintain confidentiality of reports
Security audit and review
Compare against standards, other
companies and other divisions
Test whether procedures are followed
Report findings to the management
Benchmarking and baselining
Incident Investigation
How to respond?????
Annotations:
1: Put your strategy in place
2: Why are you investigating?
3: Who is investigating?
4: Who needs to know?
5: Whats the end-point
Evidence handling
Annotations:
1: Audit trails, system logs, phone records, emails & backups
2: Evidence handling and security procedures are essential
3: usually work off a copy rather than the evidence itself