Quantcast
Channel: Audit
Browsing all 10 articles
Browse latest View live

Anatomy of an Auditing System

An auditing system consists of three components: the logger, the analyzer, and the notifier. These components collect data, analyze it, and report the results.1. Logger Logging mechanisms record...

View Article


Image may be NSFW.
Clik here to view.

Download TrueCrypt 6.0, Free On the fly Encryption Software

TrueCrypt is a software application used for on-the-fly encryption. It can create a virtual encrypted disk in a file (container), which can be mounted as if it were a real disk. TrueCrypt also supports...

View Article


Intrusion Detection Is an Art and a Science

Certain prerequisites are necessary to make an intrusion detection system worthwhile, including the following:• Network administrators with intrusion detection experience.• Network administrators with...

View Article

The Top 5 Internal Information Technology Security Threats

The top five internal security threats from ITsecurity.com1. Your Employees Are Selling You Out, Part 1 Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization in an...

View Article

Download Free Policy & Procedure Manager 4.5 for Regulatory Compliance Standards

The web-based Policy & Procedure Manager provides your staff with instant access to your organization's policies and procedures. It notifies those who are required to read specific documents and...

View Article


What is FreeBSD Portaudit

FreeBSD Portaudit is a software vulnerability auditing software for Free BSD. The ports-mgmt/portaudit port polls a database, updated and maintained by the FreeBSD Security Team and ports developers,...

View Article

Principles of Generally Accepted Information Security Principles (GAISP)

GAISP is based on a solid consensus-building process that is central to the success of this approach. Principles at all levels are developed by information security practitioners who fully understand...

View Article

OneSixtyOne Fast SNMP scanner

onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. It can scan an entire class B network in under 13 minutes. It can be used to discover devices...

View Article


Image may be NSFW.
Clik here to view.

Download Lynis - Audit Tool for Linux

Looking for simple tools for audit your linux system security and configuration? you may try Lynis free at no cost.Download: http://www.rootkit.nl/projects/lynis.htmlLynis is an auditing tool for Unix...

View Article


Five reasons why we need IT Auditor

1. There are significant development under information technology area especially those related with the interfacing and managing complex application.2. Auditors realized that computers had impacted...

View Article
Browsing all 10 articles
Browse latest View live