Additional Considerations

Additional considerations might exist for your environment depending on your size, your geographic reach, and what kind of data exist on your network. Some of these additional considerations might include

  • License management for software tracked by the number of users.

  • Verify that processes exist for international support for diverse or geographically scattered organizations.

  • Categorize the types of data typically stored on corporately managed mobile devices and the level of protection typically required in accordance with your information classification policy.

  • Evaluate the switching and routing infrastructure as it relates to these components.

IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
Year: 2004
Pages: 159 © 2008-2017.
If you may any questions please contact us: