Information security audit

Results: 2404



#Item
421Cyberwarfare / Information technology audit / Software testing / Information technology security audit / Threat / Security testing / Attack / Information security audit / Computer security / Computer network security / Security

Security Testing: Step by Step System Audit with Rational Tools First Presented for:

Add to Reading List

Source URL: www.perftestplus.com

Language: English - Date: 2006-02-02 15:46:28
422Information technology / Cognos Reportnet / Data management / IBM software / Online analytical processing / Cognos / Application server / IBM / IBM Cognos 8 Business Intelligence / Business intelligence / Business / Computing

genware audit processor The Genware Audit Processor™ provides advanced usage, usability, administrative, and security information for IBM® Cognos® Application Server Technologies. Application Management

Add to Reading List

Source URL: www.genwarecs.com

Language: English - Date: 2014-09-12 09:52:26
423Internal Revenue Service / Computing / Information technology audit / Information security / National security / Security controls / Taxation in the United States / Federal Information Security Management Act / Government Accountability Office / Computer security / Data security / Security

GAO[removed]Accessible Version, INFORMATION SECURITY: IRS Needs to Continue Improving Controls over Financial and Taxpayer Data

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-23 15:20:36
424Data security / Risk / Computer security / Security / Information technology management / Information Systems Audit and Control Association / Certified Information Systems Auditor / Internal audit / CISA / Auditing / Information technology audit / Accountancy

Microsoft Word - ISOM4300_syllabus_Spring1415

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2015-03-04 18:13:22
425Crime prevention / National security / Computer security / Unisys / Burroughs MCP / Computer-aided audit tools / Access control / Password / Unisys OS 2200 operating system / Security / Computer network security / Information technology audit

Locum Software Services Limited Security Solutions ALERT ASSURE

Add to Reading List

Source URL: www.locumsoftware.co.uk

Language: English - Date: 2015-02-18 04:57:12
426Internal Revenue Service / Computing / Information technology audit / Information security / National security / Security controls / Taxation in the United States / Federal Information Security Management Act / Internal control / Computer security / Data security / Security

GAO[removed]; Information Security: IRS Needs to Continue Improving Controls over Financial and Taxpayer Data

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-19 13:59:05
427Risk management / Actuarial science / Security / Project management / Internal control / Operational risk / Financial risk / IT risk management / Information technology audit process / Risk / Management / Ethics

50 Template: Risk Management Risk is a normal part of developing and delivering a service. One of the key functions of the committee and staff is to understand the risks faced by the organisation, and to facilitate the

Add to Reading List

Source URL: www.gga.org.au

Language: English - Date: 2012-10-25 02:43:49
428Security / Information technology audit / Computer security / Network management / Syslog / Operating system / File system / Access control / Information technology audit process / Auditing / Information technology management / Computing

Secure4Audit A Technical White Paper NOTICE As Secure4Audit is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information contained

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2008-01-14 04:28:23
429Internet privacy / Information technology controls / Privacy / Information security audit / Information security / Ethics / Accountability / Freedom of information legislation

The Bureau of the Fiscal Service Privacy Impact Assessment Personnel Action Workflow System (PAWS) The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational ef

Add to Reading List

Source URL: www.publicdebt.treas.gov

Language: English - Date: 2015-02-25 09:14:19
430Auditing / Ethics / Security / Risk management / Internal control / Enterprise risk management / Information technology audit process / Management / Risk / Actuarial science

Risk Management Policy ORG-RISK-POL-001 Origin is committed to the effective management of risk, which is central to the continued growth and profitability of the company. The purpose of this policy is to ensure that:

Add to Reading List

Source URL: www.originenergy.com.au

Language: English - Date: 2015-04-16 11:43:04
UPDATE