Skip to main content
Home
  • Home
  • About University
    • President Message
    • Gallery
  • Colleges
    • College of Administration and Economics
    • College of Veterinary
    • College of Law
    • College of Medicine
    • College of Islamic Sciences
    • College of Applied Sciences
    • College of Education
  • Centers & Departments
    • Departments
    • Centers
    • Consulting Offices
  • Staff
    • Presidency Staff
  • Programs
    • Scholarships - Undergraduate
    • Scholarships - Postgraduate
  • Contact us
  • English
  • Arabic
Home
  • Home
  • About University
      1. President Message
      2. Gallery
  • Colleges
      1. College of Administration and Economics
      2. College of Veterinary
      3. College of Law
      4. College of Medicine
      5. College of Islamic Sciences
      6. College of Applied Sciences
      7. College of Education
  • Centers & Departments
      1. Departments
      2. Centers
      3. Consulting Offices
  • Staff
      1. Presidency Staff
  • Programs
      1. Scholarships - Undergraduate
      2. Scholarships - Postgraduate
  • Contact us

Breadcrumb

  1. Home
  2. News
  3. Information security audit policy

Information security audit policy

News
October 31, 2024
Profile picture for user
by Anonymous (not verified)
  • facebook-f
  • twitter
  • envelope
  • print
Information security audit policy

Objective: Ensure sensitive systems and data security, verify security procedures, and detect potential security incidents.

Scope: All IT systems, records, policies, data centers, and security documents.

Policy Details:

  • Internal Audit: Conducted by organization employees, periodic and scheduled.
  • External Audit: Conducted by external parties, independent review, coordination with security manager.
  • Powers:
    • Audit team independence.
    • Full system access.
    • Employee cooperation.
  • Audit Team Duties:
    • Pre-planning and scheduling.
    • Implementing audits according to standards.
    • Reviewing processes and systems.
    • Evaluating security procedures.
    • Collecting evidence.
    • Preparing audit reports.
  • Reports:
    • Detailed findings and recommendations.
    • Inclusion of objectives, scope, and duration.
    • Conclusions on security measures and vulnerabilities.
  • Documentation and Evidence:
    • Accurate documentation of all audit stages.
    • Documentation of collected evidence.
    • Retention of audit documentation.
  • Code of Conduct:
    • Adherence to ethical conduct.
    • Confidentiality, integrity, and impartiality.
    • No personal or commercial use of information.
    • Immediate reporting of violations.

Detailed Audit Process Simulation:

  • Preparation and Planning:
    • Acceptable: Scheduled audit, notifications, document preparation.
    • Unacceptable: No notifications, no detailed plan.
  • Data Collection and Systems Examination:
    • Acceptable: Network and system logs, security updates, SIEM tools, server scans.
    • Unacceptable: Ignoring important systems.
  • Review of Policies and Procedures:
    • Acceptable: Review of security policies, ISO 27001 adherence, access policies, need-to-know, separation of duties.
    • Unacceptable: Neglecting incident response or backup policies.
  • Interaction with Employees:
    • Acceptable: Interviews, verification of policy adherence.
    • Unacceptable: Employee non-cooperation, inactive accounts.
  • Final Report:
    • Acceptable: Detailed report, vulnerability identification, recommendations.
    • Unacceptable: Inaccurate or incomplete documentation.
  • Follow-up and Implementation:
    • Acceptable: Review of recommendations, vulnerability fixes, awareness training.
    • Unacceptable: No action on recommendations.

Simulation of Audit Results:

  • Acceptable: Closed user accounts, daily/monthly backups, tested data recovery.
  • Unacceptable: Active former employee accounts, outdated security updates.

Recommendations:

  • Activate two-factor verification.
  • Regularly review access permissions.
  • Organize security training.

Conclusion:

  • Integrated audit process improves information security.
  • Full interaction ensures vulnerability detection and protection.

Read more articles

Information Security Conduct Policy
Newer
Information Security Conduct Policy
Fallujah University announces the opening of registration for the National English Language Test (INELT)
Older
Fallujah University announces the opening of registration for the National English Language Test (INELT)
University Presidency
Profile picture for user
Anonymous (not verified)
1
min read
A- A+
  • facebook-f
  • twitter
  • envelope
  • print

logo

Metrics & Ranking Profiles

University of Fallujah in Times Higher Education ranking 
University of Fallujah in QS ranking 
University of Fallujah in RUR ranking 
University of Fallujah in GreenMetric ranking 
University of Fallujah in Webometrics ranking 
 
 

footer menu 1

  • News
  • Scientific Events
  • Announcements
  • Community Service
  • University Presidency
  • Related Links
  • Sustainability
  • Sitemap

footer menu 2

  • Alumni
  • Library
  • Journals
  • Conferences
  • Scholarships
  • Publications
  • Contact us

Contact us

  • Address: Al-Sadd Street, near the Fallujah Passport Office
    31002, Fallujah, Anbar, Iraq
  • Phone: +9647500577943
  • Official Email: [email protected]
  • Official Email: [email protected]
  • Website Email: [email protected]
All Rights Reserved © 2025, University of Fallujah
Powered by Computer & Information Center
Home
University of Fallujah
  • Home
  • About University
    • President Message
    • Gallery
  • Colleges
    • College of Administration and Economics
    • College of Veterinary
    • College of Law
    • College of Medicine
    • College of Islamic Sciences
    • College of Applied Sciences
    • College of Education
  • Centers & Departments
    • Departments
    • Centers
    • Consulting Offices
  • Staff
    • Presidency Staff
  • Programs
    • Scholarships - Undergraduate
    • Scholarships - Postgraduate
  • Contact us
Clear keys input element