Sunteți pe pagina 1din 35

Auditing

Operating
Systems and
Networks
Presented by:
GROUP 4

Del Pozo, Lyra


Macalintal, Rviela Valeen C.
Laureano, Marc Aderades O.
Rosales, Angie S.
AUDITING
OPERATING
SYSTEMS
Operating
System
- is the computer’s control
program that allows users and
their applications to share and
access common computer
resources.
3 Main Tasks
of an OS
1. Translates high-level languages in
machine-level language that
computers can execute.
2. Allocates computer resources to
users, workgroups, & applications.
3. Manages the tasks of job scheduling
and multiprogramming.
Operating
System Objectives
Operating
System Security
Threats to
Operating System Integrity
Operating System
Controls and Audit Tests
1. Controlling Access Privileges
Operating System
Controls and Audit Tests
2. Password Control
Operating System
Controls and Audit Tests
2. Password Control
Common Methods of Password Control
1. Reusable Passwords
The user defines the password to the system once and then
reuses it to gain future access. The quality of the security
that a reusable password provides depends on the quality
of the password itself.
2. One-Time Passwords
Under this approach, the user’s password changes
continuously the PIN/Password delivered directly to the
user at the time of login, on the user’s registered device or
app.
Operating System
Controls and Audit Tests
2. Password Control
Operating System
Controls and Audit Tests
3. Controlling against Malicious and
Destructive Programs
Operating System
Controls and Audit Tests
3. Controlling against Malicious and
Destructive Programs
Operating System
Controls and Audit Tests
3. Controlling against Malicious and
Destructive Programs
Operating System
Controls and Audit Tests
3. Controlling against Malicious and
Destructive Programs
Operating System
Controls and Audit Tests
4. System Audit Trail Controls

System audit trails are logs that record activity at the system,
application, and user level.
Operating System
Controls and Audit Tests
4. System Audit Trail Controls
AUDITING
NETWORKS
Intranet Risks
Internet Risks
Internet Risks
Three Common Types of DOS Attacks
Controlling Risks
from Subversive Threats
1. Firewalls
Controlling Risks
from Subversive Threats
2. Controlling DOS Attacks
Controlling Risks
from Subversive Threats
3. Encryption
Controlling Risks
from Subversive Threats
4. Digital Signatures and Certificates
Controlling Risks
from Subversive Threats
Other Subversive Threat Controls
Controlling Risks
from Subversive Threats
Audit Objectives and Audit Procedures
Controlling Risks
from Equipment Failure
Audit Objectives and Audit Procedures

S-ar putea să vă placă și