Information technology controls

Results: 1397



#Item
271Business / Internal audit / Audit committee / Enterprise risk management / Audit / External auditor / Internal control / Chief audit executive / Information technology audit process / Auditing / Accountancy / Risk

Microsoft Word - Section 5 _Ex Auditor and Intl Controls_.doc

Add to Reading List

Source URL: www.kcrc.com

Language: English - Date: 2014-04-16 06:04:42
272Data security / Information technology / Technology / Crime prevention / National security / Information security / Data center / Information and communications technology / Security controls / Computing / Security / Computer security

Physical Security Management Guidelines Physical security of ICT equipment, systems and facilities Approved 27 October 2011

Add to Reading List

Source URL: www.protectivesecurity.gov.au

Language: English - Date: 2014-12-07 22:52:10
273Risk / Committee of Sponsoring Organizations of the Treadway Commission / Internal control / Information security management system / Social accounting / Information technology audit process / Entity-level controls / Auditing / Accountancy / Business

Internal Control Framework November 2013 2

Add to Reading List

Source URL: who.int

Language: English - Date: 2014-01-07 12:01:41
274Data security / Public safety / Crime prevention / National security / Information security / Penetration test / Security controls / Cyber security standards / Information Technology Security Assessment / Security / Computer security / Computer network security

Security Standard: Solutions Life Cycle Management Scope The standard applies to new IT services (including third-party and RIT-hosted, and software as a service) that meet any one or more of the following:  host or p

Add to Reading List

Source URL: www.rit.edu

Language: English - Date: 2014-07-17 13:14:03
275Key management / Cyberwarfare / Information technology management / Information security management system / Certificate policy / Information security / Public key certificate / Security controls / IT service management / Data security / Security / Computer security

[removed]Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2014-12-18 00:39:24
276Computer security / Auditing / Cyberwarfare / Certificate policy / Audit / Information security / Security controls / Public key certificate / Information technology audit / Data security / Security / Key management

Gatekeeper Compliance Audit Program

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2014-12-18 00:44:27
277Computer security / Auditing / Data management / Computer network security / Audit / Data center / Security controls / Computer-aided audit tools / Internal audit / Information technology audit / Computing / Information technology management

Countywide Data Centers and Disaster Recovery A Report to the Board of Supervisors

Add to Reading List

Source URL: www.maricopa.gov

Language: English - Date: 2009-03-12 18:42:16
278Information technology management / Computer security / Risk / Information technology audit / Corporate governance of information technology / Information security / Information technology controls / Governance / IT risk / Data security / Security / Auditing

Maricopa County Internal Audit Department 301 West Jefferson Street Suite 660 Phoenix, AZ[removed]

Add to Reading List

Source URL: www.maricopa.gov

Language: English - Date: 2011-02-17 15:54:11
279Security / Information technology controls / Audit / Information security / Business / Internal control / Continuous auditing / Information systems / COBIT / Auditing / Information technology audit / Risk

Important Announcement 1st August, 2013 Revision of syllabus of Group – I – Paper- 4 - Taxation – Part – II and Group – II – Paper – 7 - Section A: Information Technology of Intermediate (IPC) Course; and G

Add to Reading List

Source URL: 220.227.161.86

Language: English - Date: 2014-01-21 06:19:25
280Computing / Information technology management / ISO/IEC 27002 / Information security management system / ISO/IEC 27001 / Information security / ISO 27799 / Corporate governance of information technology / Security controls / Data security / Security / Computer security

Journal Online An Introduction to Information Security Management in Health Care Organizations Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2011-11-14 16:17:24
UPDATE