Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

Buy

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT audit work day in and day out in real corporations. If we’ve been successful, reading this book will accomplish three objectives for the reader, above and beyond what can be obtained from most IT auditing books and classes:

Guide the reader in how to perform the IT audit function in such a way that the auditors maximize the value they provide to the company. Part I of this book is dedicated to providing practical guidance on how to perform the IT audit function in such a way that it will be considered an essential and respected element of the company’s IT environment. This guidance is pulled from years of experience and best practices, and even the most experienced of IT auditors will find a plethora of useful tools and techniques in those chapters.

Enable the reader to perform thorough audits of common IT topics, processes, and technologies. Part II of this book is dedicated to guiding the reader with practical, detailed advice on not only what to do but also why and how to do it. Too many IT audit resources provide bullet-oriented checklists without empowering the auditor with enough information to understand why they’re performing that task or how exactly to accomplish the step. Our goal is to fill that gap for the reader.

Give the reader exposure to IT audit standards and frameworks as well as the regulations that are currently driving the IT audit profession. Part III focuses on standards and frameworks such as COBIT, ITIL, and ISO 17799 as well as regulations such as Sarbanes-Oxley, HIPAA, and PCI. Another goal of this section is to demystify risk assessment and management, which is required by most regulations.

A wealth of knowledge and resources for hardening systems and performing detailed penetration tests are available in other texts. That is not the focus of this book. In our experience as auditors, we have been called on more often to judge the quality of internal controls from an insider’s standpoint. Therefore, the majority of audit steps in this book are written with the assumption that the auditor has full access to all configuration files, documentation, and information. This is not a hackers’ guidebook but is instead a guidebook on how an auditor can assess and judge the internal controls and security of the IT systems and processes at his or her company.

(HTML tags aren't allowed.)

The Greatest Show on Earth: The Evidence for Evolution
The Greatest Show on Earth: The Evidence for Evolution
In 2008, a Gallup poll showed that 44 percent of Americans believed God had created man in his present form within the last 10,000 years. In a Pew Forum poll in the same year, 42 percent believed that all life on earth has existed in its present form since the beginning of time.

In 1859 Charles Darwin's masterpiece, On the...

Effective Time Management: Using Microsoft Outlook to Organize Your Work and Personal Life (Business Skills)
Effective Time Management: Using Microsoft Outlook to Organize Your Work and Personal Life (Business Skills)

Take charge—and create an effective balance between your work and personal life with the help of Microsoft Outlook. In this practical guide, two experts teach you a proven time-management system, showing you how to set and manage your priorities with custom modifications to Outlook. Sharpen your focus, combat distractions—and...

Engineering a Compiler
Engineering a Compiler
The proliferation of processors, environments, and constraints on systems has cast compiler technology into a wider variety of settings, changing the compiler and compiler writer's role. No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it...

A Field Guide to Cape Cod: Including Nantucket, Martha’s Vineyard, Block Island, and Eastern Long Island
A Field Guide to Cape Cod: Including Nantucket, Martha’s Vineyard, Block Island, and Eastern Long Island
A richly illustrated full?color guide to the unique plants, wildlife, and environments of Cape Cod and the other nearby “Outer Lands” that face the Atlantic Ocean
 
This essential guidebook presents the most abundantly illustrated and fascinating account of the natural history of Cape Cod,
...
Definitive Guide to Excel VBA
Definitive Guide to Excel VBA

In this book, Michael Kofler provides definitive coverage of Visual Basic for Applications (VBA) for Excel by showing how it can be used to implement real-world business solutions. Designed to be useful to programmers who have never used VBA before, it also covers advanced topics needed for users already familiar with...

High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy