Assuming audit is required, the following results were found.

  • Network Security

    External Network Scanning One of the core mechanisms for protecting networks is to install a firewall to mediate traffic between systems on the internal network, publicly accessible systems is a DMZ (from the military term d e m ilitarised z one) and...

  • A Taxonomy of Loss

    address or identity. Server logs can reveal an attack but are not sufficient to completely identify the attacker. Testingand Auditing Keys features of the security system can be tested to ensure that security policies are being observed and that defence...

  • Computers are for life, not just for Christmas

    you need? You should consider regular monitoring of error logs (to see if anything is going horribly wrong) and activity/audit logs (to see if people are actually using the system). You might want to start with more frequent checks (daily or weekly) and...


Results 1 - 3 of 3