Information security audit

Results: 2404



#Item
131Network management / Internet protocols / Internet standards / System administration / Syslog / ArcSight / Information technology security audit / Security information and event management / Cisco Security Monitoring /  Analysis /  and Response System / Computing / Computer security / Information technology management

DATASHEET Real-Time Security Events from IBM i Monitor Your Most Critical Data The IBM i OS runs some of the most critical business applications in your organization. PowerTech Interact™

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2013-07-15 08:41:14
132Computer security / Computer network security / Information technology audit / Black Hat Briefings / Code audit / Vulnerability / Computer virus / Application security / Security / Cyberwarfare / Software testing

Owning Anti-Virus: Weaknesses in a Critical Security Component AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
133Business / Internal control / Committee of Sponsoring Organizations of the Treadway Commission / Information security management system / Government Accountability Office / Chief financial officer / Management system / Internal audit / Information technology audit process / Auditing / Accountancy / Risk

AIMDStandards for Internal Control in the Federal Government

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2011-09-29 23:06:34
134Privacy / Technology / Crime prevention / National security / BlackBerry / Audit / Transaction log / Surveillance / Inventory / Information appliances / Personal digital assistants / Security

BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AUDIT OF BLACKBERRY AND CELL PHONE INTERNAL CONTROLS

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:08:59
135Security / Risk / Management / Certified Information Systems Auditor / CISA / Prevention / Information technology security audit / Security convergence / Professional certification / Auditing / Data security / Information technology audit

Microsoft Word - CISASCMagazine.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:04
136Auditing / Actuarial science / Risk management / Internal control / Information security / Audit / Sarbanes–Oxley Act / Operational risk / SOX 404 top–down risk assessment / Risk / Security / Ethics

Microsoft Word - time040317b

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-18 07:08:37
137Software / System software / SekChek Local / SekChek Classic / HP-UX / Microsoft Windows / Microsoft / Computer security / Computer-aided audit tools / Information technology audit

Used for over 15 years by multinationals across the world, SekChek’s automated analysis quickly determines how a company’s security controls stack up against similar deployments – not in theory, but using current,

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-01-14 03:23:06
138Information technology audit / Computing / Accountancy / Computer-aided audit tools / Internal audit / Audit / Cloud database / Computer security / Cloud computing security / Cloud computing / Centralized computing / Auditing

Evaluation Model for Internet Cloud Data Structure Audit System Wang Fan School of Accounting Zhejiang Gongshang University Hangzhou, 310018, P. R.China

Add to Reading List

Source URL: dline.info

Language: English - Date: 2014-05-16 22:36:53
139Business / Actuarial science / Security / Data security / Risk management / Internal audit / Emergency management / Information security management system / Audit committee / Management / Auditing / Risk

Risk Management - Enterprise-Wide Policy and Framework - NSW Health

Add to Reading List

Source URL: www0.health.nsw.gov.au

Language: English - Date: 2014-10-01 18:01:32
140Standards / Data security / Professional certification / Certified Information Security Manager / Cisco Career Certifications / CompTIA / Global Information Assurance Certification / Information Systems Audit and Control Association / Information technology audit / Education / Computing / Computer security

Research in Business and Economics Journal A quantitative examination of perceived promotability of information security professionals with vendor vendor-specific specific

Add to Reading List

Source URL: www.aabri.com

Language: English - Date: 2012-01-21 11:12:51
UPDATE