E


EAP-MD5, 269

EAP-TLS (Transport Layer Security), 269

EAP-TTLS (Tunneled Transport Layer Security), 269

early involvement, 9-11

earth movement hazards, 89

EF (exposure factor), 352, 364

electronic shielding, in data centers, 93

electronic vaulting, 107

elevation of privilege, 250

emergency operations, 103-104, 110

emergency services, distance of data centers from, 90

encryption

database, 239-240

network, 239-241

techniques, 258

enterprise resource planning (ERP) application, 21

enterprise risk management-integrated framework, 311-315

control activities, 314

COSO effect on IT controls, 315

definition of enterprise risk management, 312

event identification, 313

impact of COSO, 314-315

information and communication, 314

internal environment, 313

monitoring, 314

object setting, 313

overview, 311, 312-313

relationship with internal control-integrated framework, 314

risk assessment, 313

risk response, 314

entity-level controls, auditing, 21, 61-81

background, 61-62

knowledge base, 79

master checklist, 80-81

overview, 61

test steps, 62-79

environmental controls, 92-93

environmental hazards around data centers, 88-89

ERP (enterprise resource planning) application, 21

error handling, 218-219

Error Reporting Service, 145

error/exception reports, 253-254

ESS (extended service set), 264

estimations, inaccurate, 355

/etc/hosts.equiv file, 190-192

/etc/passwd file, 184-185

EU Commission and Basel II, 345

European Directive on the Protection of Personal Data, 341

execution of projects, standards for, 66

executive summary, in audit report, 51, 303

exposure factor (EF), 352, 364

extended service set (ESS), 264

exterior lighting, of data centers, 88



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net