A reduction in which of the following would indicate improved performance in the administration of information security?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Upon completion of audit work, an IS auditor should: