Safety audit is an integral part of audit. Because the security of computer network environment will not only involve national security, but also involve the economic interests of enterprises. Therefore, we think it is necessary to establish a trinity safety audit system of state, society and enterprises as soon as possible. Among them, the national security audit institution should implement an annual audit system for the information security of enterprises on the WAN according to national laws, especially for the various security technical requirements of the computer network itself. In addition, social intermediary organizations should be developed to provide audit services for the security of computer network environment. Like accounting firms and law firms, they are all institutions that evaluate the security of enterprise computer network systems. When the enterprise management authorities weigh the potential losses caused by the network system, they need to check and evaluate the security through the intermediary. In addition, financial and financial auditing can not be separated from network security experts, who evaluate the security control of the network and help certified public accountants to make a correct judgment on the authenticity and reliability of the information disclosed by the corresponding information processing system.
Ira Winkler, Chairman of Internet Security Consulting Group, believes that security audit, vulnerability assessment and penetration test are the three main ways of security diagnosis. These three adopt different methods and are suitable for specific goals. Security audit measures the performance of information system through a series of standards. Vulnerability assessment involves a comprehensive investigation of the entire information system and finding potential security vulnerabilities. Penetration testing is a covert operation, and security experts carry out a lot of attacks to explore whether the system can resist similar attacks from malicious hackers. In the penetration test, forged attacks may include any attacks that real hackers may try, such as social engineering. Each of these methods has its inherent ability, and the combination of two or more methods may be the most effective.