Information security audit: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
85 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Information security audit: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
85 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different methods for auditing these areas.


When centered on the IT aspects of information security, it can be seen as a part of an information technology audit. It is often then referred to as an information technology security audit or a computer security audit. However, information security encompasses much more than IT.


This book is your ultimate resource for Information security audit. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Information security audit right away, covering: se drag & drop to reorder wiki pages and chapters, Information security audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information technology audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud


This book explains in-depth the real drivers and workings of Information security audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information security audit with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743048856
Langue English
Poids de l'ouvrage 3 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents