Flylib.com
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
Table of Contents
Back Cover
IT Auditing-Using Controls to Protect Information Assets
Foreword
Introduction
How This Book Is Organized
A Final Word to Our Readers
Part I: Audit Overview
Chapter 1: Building an Effective Internal IT Audit Function
Independence-The Great Myth
Consulting and Early Involvement-There s More to Being an Auditor than Auditing
Four Methods for Consulting and Early Involvement-Your Toolkit
Relationship Building-Partnering versus Policing
The Role of the IT Audit Team
Forming and Maintaining an Effective IT Audit Team
IT Professionals
Career IT Auditors versus IT Professionals-Final Thoughts
Maintaining Expertise
Relationship with External Auditors
Summary
Chapter 2: The Audit Process
Determining What to Audit
The Stages of an Audit
Standards
Summary
Part II: Auditing Techniques
Chapter 3: Auditing Entity-Level Controls
Test Steps
Knowledge Base
Master Checklist
Chapter 4: Auditing Data Centers and Disaster Recovery
Data Center Auditing Essentials
Auditing Data Centers
Neighborhood and Environment
Physical Access Control
Environmental Controls
Power Continuity
Alarm Systems
Fire Suppression
Surveillance Systems
Data Center Operations
Auditing Disaster Recovery
System Resiliency
Data Backup and Restore
Disaster Recovery Planning
Knowledge Base
Master Checklists
Chapter 5: Auditing Switches, Routers, and Firewalls
Network Auditing Essentials
Auditing Switches, Routers, and Firewalls
General Network Equipment Audit Steps
Additional Switch Controls-Layer 2
Additional Router Controls-Layer 3
Additional Firewall Controls
Tools and Technologies-Auditing Networking Equipment
Knowledge Base
Master Checklists
Chapter 6: Auditing Windows Operating Systems
Windows Auditing Basics
Performing the Audit
Windows Server Test Steps
Setup and General Controls
Review Services, Installed Applications, and Scheduled Tasks
Account Management and Password Controls
Review User Rights and Security Options
Network Security and Controls
Tools and Technology
Knowledge Base
Master Checklists
Chapter 7: Auditing Unix and Linux Operating Systems
Getting Around
Test Steps
Tools and Technology
Knowledge Base
Master Checklists
Chapter 8: Auditing Web Servers
Web Auditing Essentials
Auditing Web Platforms and Web Applications
Auditing Web Servers
Auditing Web Applications
Tools and Technologies
Knowledge Base
Master Checklists
Chapter 9: Auditing Databases
Database Basics
Performing the Audit
Tools and Technology
Knowledge Base
Master Checklist
Chapter 10: Auditing Applications
Generalized Frameworks
Best Practices
Performing the Application Audit
Master Checklists
Chapter 11: Auditing WLAN and Mobile Devices
WLAN and Mobile Device Auditing Essentials
Performing the Wireless LAN Audit
Performing the Mobile Device Audit
Additional Considerations
Tools and Technology
Knowledge Base
Master Checklists
Chapter 12: Auditing Company Projects
Test Steps
Testing
Implementation
Training
Project Wrap-up
Knowledge Base
Master Checklists
Part III: Frameworks, Standards, and Regulations
Chapter 13: Frameworks and Standards
COSO
CoBIT
ITIL
ISO 27001ISO 17799BS 7799
NSA INFOSEC Assessment Methodology
Frameworks and Standards Trends
References
Chapter 14: Regulations
The Sarbanes-Oxley Act of 2002
Gramm-Leach-Bliley Act
Privacy Regulations Such as California SB 1386
Health Insurance Portability and Accountability Act of 1996
EU Commission and Basel II
Payment Card Industry (PCI) Data Security Standard
Other Regulatory Trends
Chapter 15: Risk Management
Risk Analysis
IT Risk Management Life Cycle
Summary of Formulas
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y-Z
List of Figures
List of Tables
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Skin Effect
Waveguide Dispersion Region
Pcb (printed-circuit board) Traces
The Underlying Simulation Engine
Appendix A. Building a Signal Integrity Department
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Forming Your Kanban Team
Appendix A MRP vs. Kanban
Appendix E EOQ vs. Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Translation Patterns
Route Plan Report
Summary
Configuring Cisco VT Advantage
Quality Report Tool
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
Competency-Based HR Planning
Competency-Based Employee Development
The Transformation to Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Microsoft VBScript Professional Projects
What Is VBScript?
Procedures
Project Case Study Desktop Customization and Deployment
Maintaining a 30-Day Summary Log Archive
Converting Reports to HTML Pages
User Interfaces in C#: Windows Forms and Custom Controls
Forms
Modern Controls
Custom Controls
MDI Interfaces and Workspaces
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies