V


vendors

agreements with, 109-110

reviewing processes for managing, 73

ventilation, 86, 93

versioning of code, 259

virtual LANs (VLANs), 115-116, 127-128

viruses, 242

VLAN Trunking Protocol (VTP), 128

VLANs (virtual LANs), 115-116, 127-128

VTP (VLAN Trunking Protocol), 128

vulnerabilities, 352

assessing, 364-366

categorizing control gaps by severity, 366

combining control gaps, 366

determining process component control gaps, 365

identifying existing controls, 365

overview, 364-365

failure to identify, 354-355

scanning for

host-based, 155-156

network, 154-155



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net