Information Technology Reference
In-Depth Information
The use of dummy CCTV (non-active) is also permissible in some jurisdictions. Such
installations are used as decoy to keep away intruders and potential theft. Key secur-
ity personnel and management should be made aware of this deployment to avoid
misunderstanding.
Data collected and stored from CCTV should be stored for a specific duration in backup
storage where it can easily be retrieved for use. In some countries, there are legal re-
quirements for CCTV data to be stored for more than seven years. CCTV technology
has also improved over the years such that large volumes of data can be stored in
digital format and can be quickly retrieved from storage.
There are many audit objectives which can be used to review CCTV infrastructure. Some
of the audit objectives include:
1. regular review of CCTV data
2. application of access controls to CCTV data
3. implementation of security procedures for CCTV
4. safe and secure storage of CCTV data
5. compliance with legal requirements.
i) Date Centres
Data centres are areas in an enterprise which are used to locate network servers, database
servers, application system servers, and network equipment, such as routers, fire-
walls, and switches. Data centres are the heart of enterprises which are highly de-
pendent on the use of IT systems. In a highly automated enterprise, most business
processes are carried out using application systems located in data centres. Because
of this critical role, data centres are given high priority security. IS auditors are often
called in to review compliance with security procedures at data centres in order to
ensure maximum application of security measures.
There are a number of other considerations which the IS auditor should take into account
when auditing data centres, such as data centre environmental controls, access to the
data centre, power supply, and air conditioning.
Internet Technologies
The growth and use of the Internet has greatly influenced the way enterprises operate. Most
of our activities both in the office and our own personal situations are nowadays depend-
ent on the Internet in many ways. How we communicate and access information is mostly
dependent on the Internet as well. Enterprises conduct most of their business using the In-
Search WWH ::




Custom Search