Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

13
Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams

Transcript of Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Page 1: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Information Security Audit Tool 

Presented byBandar Almarashi

Supervisor by Dr. Neville Williams

Page 2: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

The project ideaIntroduction Nature of problem Why it is important

Scope of my research project MethodologyResultsAnalysis of the resultsThe project’s Web & Mobile Application’s InterfacesConclusion and Future Work

Outline

Page 3: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

The Project Idea ( ISAT )

An electronic tool to assist information security auditors to create and manage the audit process, particularly through the creation of customizable audit programs, online recording of observations and results, and the preparation of mostly automated reports.

Page 4: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

• Nature of problem

• Why it is important

Introduction

Page 5: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Scope of my Research Project

1. Why audit of information system is required?

2. What is an audit program?

3. Are there any existing audit tools? e.g. proprietary

4. What are their strength / weakness?

Page 6: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Methodology

• Design and implementation

• Overall architecture

• Choice of database

• Choice of mobile/tablet operating system

• Choice of the web application

Page 7: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Results

1. The project requirements

2. A survey questionnaire & other participants

3. The survey questionnaire & feedback

4. Iterations steps:-Software database Programming on database & develop the web applicationThe android application The implementations on the tablet/mobile app and on the

web.

Page 8: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Analysis of Results

• The audit systems being used & the audit system designed

• The continuous online auditing with a new design

• Electronic records & evaluate the auditing

Page 9: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Evaluation

Mobile Samsung Galaxy s6 edge Tablet Samsung Galaxy Tab3

Page 10: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Web Application’s Interfaces

Page 11: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Mobile Application’s Interfaces

Page 12: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Conclusion & Future Work

ConclusionThe main idea of the project is explained, and detailed of methodology is described, and experiment results is compared. Analyses of the results and evaluation are discussed, and various factors that impacted the application accuracy are explained in details.

Future work and enhancementsApplication may Support other mobile platforms like IOS for apple devices.

Page 13: Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.

Questions

?