Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management...
4
Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang Daureen Lingley- Chor
-
Upload
irene-palmer -
Category
Documents
-
view
212 -
download
0
Transcript of Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management...
Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management
AC475 Team ProjectKathleen JackowskiElizabeth Kearney-LangDaureen Lingley-Chor
Image Polymers Company, LLCCovisia Solution, Inc.
• Review of controls• Review of Audit Strategy• Tested some controls
Acceptable Use Policy
The System, including the email system and Internet connections, is the property of the Company. Each employee is responsible for the use of the System and for observing all laws. In the event that any employee is found to have improperly used the System, he or she is subject to disciplinary action, up to and including immediate dismissal.
Challenge
Audit Work Program