Information security audit

Results: 2404



#Item
91Voting / Sociology / Elections / Information society / DRE voting machine / Voter-verified paper audit trail / Ballot / Voting machine / Instant-runoff voting / Politics / Electronic voting / Election fraud

Teresa Hommel’s voting machine simulation, "Fraudo, the Fraudulent Voting Machine," has been used internationally to help people understand the security problems with computers used in voting. "Fraudo" is featured on M

Add to Reading List

Source URL: wheresthepaper.org

Language: English - Date: 2009-06-24 20:38:18
92Employee Benefits Security Administration / Employee Retirement Income Security Act / Audit / Performance audit / Inspectors general / Government / Information technology audit / Inspector General / United States Department of Labor

Office of Inspector General U.S. Department of Labor Gordon S. Heddell, Inspector General Volume 52

Add to Reading List

Source URL: www.oig.dol.gov

Language: English - Date: 2010-07-29 09:56:55
93National Information Infrastructure Protection Act / Government / Criminal law / Sensitive Security Information / Law / Computer law / Information technology audit

(9nr !lundrrd ~l\rlfth Q:ongrr55 of thr Rnitrd ~tBtr5 of gmrricB AT THE SECOND SESSION Beguii aiid held at the City of Washiiigtoii 011 Tuesday,

Add to Reading List

Source URL: www.fdicig.gov

Language: English - Date: 2013-08-28 08:45:46
94Risk / Financial audit / Pension Benefit Guaranty Corporation / Audit / Federal Information Security Management Act / Financial statement / Internal control / Information security / Inspector General / Auditing / Accountancy / Business

Pension Benefit Guaranty Corporation

Add to Reading List

Source URL: oig.pbgc.gov

Language: English - Date: 2015-05-12 11:00:25
95Business / Internal control / ICQ / Internal audit / Audit / Software development process / Information security audit / Systems Applications Products audit / Auditing / Accountancy / Risk

As public servants, it is our responsibility to use taxpayers’ dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons to place

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-03-09 10:30:57
96Financial statement / Structure / Business / Information technology audit / Finance / Management / Auditing / Data security / Information technology audit process / Charity Navigator / Charitable organization / Nonprofit organization

Arts & Entertainment Council Organizational Effectiveness – Funding Guide (A tool for evaluating Arts, Culture & Entertainment Organizations) Recommendation

Add to Reading List

Source URL: greatlakesbay.com

Language: English - Date: 2012-04-30 10:47:49
97United States Department of Homeland Security / Government / United States Department of Defense / Defense Technical Information Center / Privacy Office of the U.S. Department of Homeland Security / Defense Logistics Agency / Defense Security Service / Defense Information Systems Agency / Defense Contract Audit Agency / Military-industrial complex / Freedom of information legislation / Freedom of Information Act

DEPARTMENT OF DEFENSE AGENCY CHIEF FREEDOM OF INFORMATION ACT OFFICER REPORT FOR 2012 Preparation of this study/report cost the Department of Defense a total of approximately $35,000 for the 2012 Fiscal Year.

Add to Reading List

Source URL: open.defense.gov

Language: English - Date: 2015-04-29 07:09:52
98Ethics / Auditing / Actuarial science / Security / Internal control / Internal audit / Operational risk / ISO 31000 / Information security management system / Risk / Management / Risk management

Risk Management Policy 1 Policy statement DOOLEYS Lidcombe Catholic Club Ltd (“Dooleys”) operates in a competitive and highly regulated environment and recognises that risk management is a fundamental element of good

Add to Reading List

Source URL: www.dooleys.com

Language: English
99BS 25999 / Auditing / Data security / Business continuity / Easy2comply / Computer security / Information security / Internal audit / Risk assessment / Risk / Business / Security

Business Continuity Management Dynasec’ easy2complyTM provides a comprehensive framework to manage your organization’s Business Continuity Management program. BCM software is one module from within easy2comply’s b

Add to Reading List

Source URL: www.dynasec.org

Language: English - Date: 2015-02-15 14:40:45
100(ISC)² / Education / Safety / Professional certification / Security engineering / CBK / Information technology security audit / Corey Schou / Data security / Security / Certified Information Systems Security Professional

The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish holistic sec

Add to Reading List

Source URL: www.isc2.org

Language: English - Date: 2015-03-03 17:07:04
UPDATE