legacy information system analysis for an audit

From: hannibal blog (hannibalsec@gmail.com)
Date: Tue Jul 12 2005 - 03:41:30 EDT


hello list

For my end of studies project, I have to do an IS security audit in a
public organisation.
I'm in the first step, trying to understand their IS
I prepared a report whith the following sections:

>IS Overview
>Human ressources
>Remote sites inventory (about 30 remote sites!!)
>Applications inventory
>>>Business applications
>>>General support applications
>Servers inventory
>Internetworking devices inventory (routers & firewall)
>Switches/hubs inventory
>Interconnexions inventory
>Network architecture

what do u think.
Did I forget an important thing?
Any advices are welcome.

-- 
----------------------------------
My security audit blog
http://hannibalsec.blogspot.com


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:32 EDT