StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Audit: Lafleur Trading Company - Essay Example

Cite this document
Summary
"Security Audit: Lafleur Trading Company" paper entails the details and implications of security audit procedures carried out and observations noted for Lafleur Trading Company, a multinational concern based in Canada, dealing in wholesale food items…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Security Audit: Lafleur Trading Company
Read Text Preview

Extract of sample "Security Audit: Lafleur Trading Company"

Download file to see previous pages

 Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT functions. Therefore, to evaluate this complex system, detailed audit procedures were planned including manual as well as automated assessments.

Manual assessments mainly comprised interviewing procedures, performing physical checks and security scans, and reviewing the effectiveness of application and logical controls at different levels of the organization. We prepared system notes after developing a comprehensive understanding of the company’s business activities. Thereafter, we conducted meetings with IT personnel to identify weaker areas requiring more attention and discuss IT policies and procedures. An exhaustive review of the organogram was conducted to ensure proper segregation of duties was in place between employees holding influential or connected positions such as COO and CIO or programmer and end-user.

Automated assessments were computer-aided techniques whereby software was used to assess reporting and change management capabilities of the system. All operating systems, physical equipment, and applications were appraised for their technical specifications and development capabilities. Contingency and disaster recovery planning for each office was reviewed for effectiveness, physically inspecting for any alternate site and analyzing backup procedures for critical data. Physical security controls, including key cards and biometric devices to different offices, were checked for any loopholes allowing unauthorized access.

Moreover, environmental controls were also verified to be in place, regulating appropriate temperature and providing adequate fire-fighting equipment and uninterrupted power supply. Additional physical security checks were checked and recommendations were made accordingly, such as bodyguards, locks, single entry points, and surveillance systems. Due to remote offices and the presence of wireless networking, interception during the transmission of data was a crucial issue and was tested through procedures.

It was ensured that networks are accessible and available at all times to all offices since there is a centralized IT function. (http://www.aurco.com/images/security_audit.png) Recommendations Based on findings and observations noted during fieldwork, we made some voluntary and mandatory recommendations to improve information system controls. We recommended that encryption be adopted to avoid intrusion of sensitive data during transmission on wireless networks. Often malware limits the passage of traffic allowed on the network.

To combat this, we recommended that firewalls, intrusion detection systems, and antivirus applications must be installed promptly. We highlighted more focus on protecting information flowing on enterprise systems, mail servers, intranet networks, and host applications that are accessed by customers. Since this company relies heavily on wireless networks, we suggested that dual-control access keys must be designed, maintaining them on a system that is exclusively accessible to authorized personnel only (Saint-Germain, 2005).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Audit Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/design-technology/1480578-security-audit
(Security Audit Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/design-technology/1480578-security-audit.
“Security Audit Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/design-technology/1480578-security-audit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Audit: Lafleur Trading Company

Personal Security Audit

This paper ''Personal security audit'' tells that In gathering information regarding the need and the process to undergo a personal security audit, the Google search engine generates an enormous amount of data and research literature.... During the personal security audit, as I was made aware that through answering and going through the questions, the following areas were the identified strengths: ... Through browsing more information on doing a personal security audit, I learned that by ...
11 Pages (2750 words) Research Paper

IT Audit & Security controls at ABC Company

The use of mobile devices in any organizations is expanding day by day.... Mobile device in an organization extend the boundaries of corporate networks beyond a restricted work environment to a loosely coupled, distributed platform where workers can carry and perform there assignments anytime, anywhere using various devices such as laptops, mobile devices and PDAs and communication technologies....
25 Pages (6250 words) Essay

Security Audits

A security audit is the a final steps towards implementing an organization's security protocols.... A security audit is the a final steps towards implementing an organization's security protocols.... Obtaining a security audit can tremendously add value to organization (2011).... In order to enforce this policy, one must understand that running a security audit can save an organization millions of dollars in case of a crucial emergency(2011)....
2 Pages (500 words) Essay

Economics and Business of the Asia-Pacific Region and Emerging Markets

This essay stresses that Mao Zedong is recognised to be one of the most powerful leaders that the world has ever witnessed, who appeared as the founder of the People's Republic of China.... Mao was a principal Marxist theorist in China, who led communist revolution in the nation.... .... ... ... The essay intends to highlight the ways and also the extent of economic development in China, which took place during post Mao period....
11 Pages (2750 words) Essay

Stock Price Synchronicity and Audit Expertise

The paper "Stock Price Synchronicity and audit Expertise" is a wonderful example of a report on finance and accounting.... The paper "Stock Price Synchronicity and audit Expertise" is a wonderful example of a report on finance and accounting.... The title part of eternal auditors in the capital markets is so vital and in the wake of the current broadly open bookkeeping outrages, the consideration of speculators, security exchange commission (SEC), and the accounting proficient body has expanded on the role of auditors....
20 Pages (5000 words)

Definition of Audio Branding

The author of the "Definition of Audio Branding" paper argues that it is essential for every company to create and enhance brand identity.... Brand identity helps consumers to recall the brand while purchasing the product and in turn influences the buying behavior.... ... ... ... One of the worlds' leading marketers McDonald's had developed a campaign that was mainly focussed at children's 'Say hello to our friend, Happy!...
15 Pages (3750 words) Coursework

Audit and Control Security Technology

This case study "audit and Control Security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The document below analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The audit and control technology, however, has been initiated by experts with the latest technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study

Information Security Audit Tools

As the paper "Information security audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... Thus, this paper will seek to discuss, in detail, some of the information security audit tools.... This forms the basis for the discovery of information security audit tools that are meant to detect and stop such unwarranted access (Oliphant 2004).... These risks are responsible for not only the external but also the internal attacks and necessitate the need for an audit system....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us