From the course: Performing a Technical Security Audit and Assessment (2017)

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Challenge: Pick the right reviews

Challenge: Pick the right reviews

From the course: Performing a Technical Security Audit and Assessment (2017)

Start my 1-month free trial

Challenge: Pick the right reviews

(lively electronic music) - [Instructor] In this chapter, I covered six review techniques that are useful, when conducting technical security assessments. Your challenge is to select the correct reviews, for a given scenario. In this scenario, imagine there are a set of database servers that are critical to your organization, and the executive leadership want to know if there is any risk that data on these servers could be accidentally damaged. So, you've been asked to determine how susceptible your organization is to data loss on these systems, due to human error. As a reminder, here are the review techniques you can use: documentation review, log review, ruleset review, system configuration review, network sniffing, and file integrity checking. Think about the purpose of each of these types of reviews, and decide which ones you would pick for this scenario. When you're ready, watch the next video, and I'll…

Contents