This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policies:security:audit [2018/01/05 12:10] – external edit 127.0.0.1 | policies:security:audit [2018/01/10 12:19] (current) – [40. IT Audit] deul | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ======Baseline | + | ======Security |
=====Auditing===== | =====Auditing===== | ||
====40. IT Audit==== | ====40. IT Audit==== | ||
+ | On a regular basis security checks are performed using standard web tools such as [[https:// | ||
- | ====41. Penetration testing==== | + | Upon response to a worldwide security incident, whenever that has an impact on the IT Department managed systems, will sprout a security audit of those devices vulnerable to the incident. |
+ | ====41. Penetration testing==== | ||
+ | This is not done on a regular or controlled manner, however, each year students find it interesting to perform such attempts at will. |