Information technology security audit

Results: 1663



#Item
71Security / Audit / Business / COBIT / Information security / Auditing / Information technology audit / Risk

Microsoft Word - final report_Workshop-Antwerpen_pete

Add to Reading List

Source URL: www.erpanet.org

Language: English - Date: 2014-01-15 09:24:48
72Cyberwarfare / Information technology audit / Computer law / Federal Information Security Management Act / Security controls / Information security / Vulnerability / Certification and Accreditation / Application security / Computer security / Security / Data security

PDF Document

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:06:31
73Risk / Information technology management / Certified Information Security Manager / Computer-aided audit tools / Internal audit / Audit / External auditor / Information technology audit process / Information Systems Audit and Control Association / Auditing / Information technology audit / Accountancy

ASSISTANT INFORMATION SYSTEMS AUDITOR – HR/AISAReporting to the Information Systems Auditor, the holder will undertake reviews of the NKCC’s ICT infrastructure and provide assurance to management on the a

Add to Reading List

Source URL: newkcc.co.ke

Language: English - Date: 2015-02-10 12:33:55
74Computer security / Computing / Auditing / Crime prevention / National security / Cloud computing security / Information security / Internal audit / Information technology security audit / Centralized computing / Security / Cloud computing

IS THERE AUDITABLE SECURITY IN THE CLOUD? by Preston Williams III

Add to Reading List

Source URL: media.cloudbook.net

Language: English - Date: 2013-04-15 05:27:59
75Computing / Information security / ISO/IEC 27002 / Vulnerability / Information technology audit / NHS Scotland / Information technology controls / Asset / National Health Service / Security / Computer security / Data security

NHS SCOTLAND INFORMATION SECURITY POLICY NHS SCOTLAND INFORMATION SECURITY POLICY STATEMENT The objective of this Information Security Policy is to safeguard the confidentiality, integrity and 1 availability of all forms

Add to Reading List

Source URL: www.hfs.scot.nhs.uk

Language: English
76Information technology audit / Corporate governance / Business / ISO/IEC 27001 lead auditor / Auditing / Audit / Accreditation

ACCREDITATION RULE 14 Issue Date: Implementation Date: Supersedes: Accreditation Rule 36, SUBJECT: Access by Auditors Being Denied on Security Grounds APPLIES TO: ANAB-Accredited and Appl

Add to Reading List

Source URL: anab.org

Language: English - Date: 2014-12-29 14:36:15
77Security / Information technology audit / Computer security / Network management / Syslog / Operating system / File system / Access control / Information technology audit process / Auditing / Information technology management / Computing

Secure4Audit (auditGUARD) A Technical White Paper NOTICE As auditGUARD is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information co

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2005-01-25 07:01:00
78Network management / Internet protocols / Internet standards / System administration / Syslog / ArcSight / Information technology security audit / Security information and event management / Cisco Security Monitoring /  Analysis /  and Response System / Computing / Computer security / Information technology management

DATASHEET Real-Time Security Events from IBM i Monitor Your Most Critical Data The IBM i OS runs some of the most critical business applications in your organization. PowerTech Interact™

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2013-07-15 08:41:14
79Computer security / Computer network security / Information technology audit / Black Hat Briefings / Code audit / Vulnerability / Computer virus / Application security / Security / Cyberwarfare / Software testing

Owning Anti-Virus: Weaknesses in a Critical Security Component AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
80Business / Internal control / Committee of Sponsoring Organizations of the Treadway Commission / Information security management system / Government Accountability Office / Chief financial officer / Management system / Internal audit / Information technology audit process / Auditing / Accountancy / Risk

AIMDStandards for Internal Control in the Federal Government

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2011-09-29 23:06:34
UPDATE