This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| policies:security:audit [2018/01/05 12:14] – [Baseline Security] deul | policies:security:audit [2018/01/10 12:19] (current) – [40. IT Audit] deul | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| ====40. IT Audit==== | ====40. IT Audit==== | ||
| + | On a regular basis security checks are performed using standard web tools such as [[https:// | ||
| - | ====41. Penetration testing==== | + | Upon response to a worldwide security incident, whenever that has an impact on the IT Department managed systems, will sprout a security audit of those devices vulnerable to the incident. |
| + | ====41. Penetration testing==== | ||
| + | This is not done on a regular or controlled manner, however, each year students find it interesting to perform such attempts at will. | ||