Security audit in any company involves defining the levels of security in the company system. It includes vulnerability scans, review of application and system controls, and analysis of physical access to the system. Auditing is carried out to ensure the integrity of a company's data information and the reliability of the data exchange process across the network environment. In most cases, the security audit is carried out to ensure that security measures are in place to protect the company from information leakage to the outside world. This document addresses all issues involved in the security audit of the Ariam travel agency network and its locations. Security check Ariam travel agency handles mass information that contains sensitive information about customers and employees; contains multiple external users and various e-commerce applications. Therefore, data security in this company is very important. Information requiring protection in this agency includes customer details, associated business procedures, company policies, employee information, network documentation, security policies, and sensitive business procedures, among others. First, when we try to cover gaps caused by network vulnerabilities, we identify people who have access to company information. These include employees, customers, programmers, and network coordinators in general. Then, we establish limits on information access and the type of information that various parties can access. Another factor is when the data is accessed and from where it can be retrieved. In this phase we must identify the network configuration, the connection to the external network and the levels of protection represented. Since Ariam travel agency...... middle of paper...... the network that shares information across the entire network. Remote access to the network is limited and therefore gaps are created while monitoring software, scanning servers and network routers ensure the integrity of the stored information. The system is therefore competent enough to protect the company from hackers and crackers, and is best for business. Works Cited Haixin Wang, Guoqiang Bai and Hongyi Chen, (2009). Design and implementation of a high-performance security network. Harrish Setee, (2001). Best security practices. System Administrator.Keller, John, (2005). Military and aerospace electronics, physical security, and wireless networks are driving today's technology trends in handheld computers and rugged PDAs. vol. 16 Issue 9, p26-28, 3pVerton, Dan. (2001). Physical security seen as fundamental in protecting networks, Computerworld.Vol. 35 Edition 30,
tags