Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management...

4
Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang Daureen Lingley- Chor

Transcript of Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management...

Page 1: Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang.

Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management

AC475 Team ProjectKathleen JackowskiElizabeth Kearney-LangDaureen Lingley-Chor

Page 2: Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang.

Image Polymers Company, LLCCovisia Solution, Inc.

• Review of controls• Review of Audit Strategy• Tested some controls

Page 3: Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang.

Acceptable Use Policy

The System, including the email system and Internet connections, is the property of the Company. Each employee is responsible for the use of the System and for observing all laws. In the event that any employee is found to have improperly used the System, he or she is subject to disciplinary action, up to and including immediate dismissal.

Page 4: Firewall Management, Intrusion Detection, Intrusion Prevention and Security Information Management AC475 Team Project Kathleen Jackowski Elizabeth Kearney-Lang.

Challenge

Audit Work Program