• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: MIS5205-Introduction
      • Week 2: Framework-Function-Process
      • Week 3: GCC-DBMS
      • Week 4: Operating Systems
      • Week 5: OS Auditing and IT Risk Assessment
      • Week 6: Network and Network Auditing
      • Week 7: Service Level Agreement
    • Second Half of the Semester
      • Week 8: Datacenter Operations Review
      • Week 9: BCP and DR
      • Week 10: Application Control
      • Week 11: Information Security
      • Week 12: Change Management and Licensing
      • Week 13: Fall Break/No Class
      • Week 14: Auditing Capacity/Performance/EndUser Computing
      • Week 15: Emerging technology risks and controls (presentation)
  • Assignments
    • Team Assignment #1
    • Team Assignment #2
    • Team Assignment #3
    • Emerging technology
    • Cybersecurity/Data Breach
  • Webex
  • HBR Coursepack
  • Roster
  • Gradebook

ITACS 5205

Temple University

Week 6: Network and Network Auditing

WeBex Meetups (1.5 hrs)

Weekly Slides Deck:

it-service-delivery-and-support_network

Network, network security and administration overview

Discussion

  • Risks and controls associated with a company’s network
  • Network Auditing Program

Activities:

Video: Warriors of the Net

https://www.youtube.com/watch?v=HOaIqQAeaik

Quiz #5 via Blackboard

Weekly Reading Assignments:

IT Auditing

  •  Chapter 14: Auditing Cloud Computing and Outsourced Operations
  •  FFIEC Outsourcing Booklet: http://ithandbook.ffiec.gov/ITBooklets/FFIEC_ITBooklet_OutsourcingTechnologyServices.pdf

Access Control Comparison:

Good Company Bad Company
All access is 2 factor All supporting members above the rank of helpdesk have “domain admin rights” to make their job easy
All access is role based The IT department has admin rights tied to their normal everyday accounts
All roles are determined by job functions Some users in audit have local admin rights; audit regularly needed to update their auditing software
Permissions are designed from Least to Most Restrictive across all OS platforms, files, and devices Logging is turned on, but the logs overwrite themselves every 7 days because of lack of space
Monthly metrics are collected on all systems to ensure they are in compliance  
CIO and CFO each only have ½ of the Enterprise Admin. credential

Primary Sidebar

Weekly Discussions

  • Weekly Questions (7)
  • Welcome (1)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in