This 3-page paper talks about the importance of a security audit, and how such audits typically take place. Bibliography lists 3 sources.