AuthorsDen.com   Join Free! | Login    
   Popular! Books, Stories, Articles, Poetry
Where Authors and Readers come together!

SIGNED BOOKS    AUTHORS    eBOOKS new!     BOOKS    STORIES    ARTICLES    POETRY    BLOGS    NEWS    EVENTS    VIDEOS    GOLD    SUCCESS    TESTIMONIALS

Featured Authors:  David Schwinghammer, iRonald Yates, iGreg Pendleton, iLark Pogue, iS Zachary, iBurton Pines, iMaryAngela Nangini, i

  Home > Business/Investing > Books Popular: Books, Stories, Articles, Poetry     

Robert E. Davis

· + Follow Me
· Contact Me
· Books
· Articles
· News
· 5 Titles
· 4 Reviews
· Add to My Library
· Share with Friends!
·
Member Since: Jan, 2007

Robert E. Davis, click here to update your pages on AuthorsDen.


IT Auditing: Assuring Information Assets Protection
by Robert E. Davis   

Share this with your friends on FaceBook
Books by Robert E. Davis
· IT Auditing: An Adaptive Process
· IT Auditing: The Process
· IT Auditing: Irregular and Illegal Acts
                >> View all

Read Free Preview!


Category: 

Business/Investing

Publisher:  Pleier Corporation ISBN-10:  1935133209 Type: 
Pages: 

265

Copyright:  Nov 3 2008 ISBN-13:  9781935133209
Non-Fiction

Download to your Kindle (eBook)
Download to your Nook (eBook)
Download from Apple iTunes (eBook)
Download from Smashwords (eBook)
Amazon
Lulu
Lulu.com
IT Auditing: Assuring Information Assets Protection

“IT Auditing: Assuring Information Assets Protection” provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. This publication converts selected audit standards and guidelines into practical applications using detailed examples and vivid graphics - including definitions of over 140 acronyms helpful in providing assurance services. This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases.

 The value of most organizations today is in the invisible information assets that provide key knowledge necessary to succeed in conducting business.  Many of these information assets are digital.

Unlike physical assets, information assets can not be seen or touched directly.  Furthermore, unlike physical assets, information assets can be more easily damaged or destroyed accidentally or on purpose by persons in the computer room, in the organization, or an unknown person half way around the world.  The nature of these information assets requires extremely close scrutiny.

“IT Auditing: Assuring Information Assets Protection” provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques.  This publication converts selected audit standards and guidelines into practical applications using detailed examples and vivid graphics - including definitions of over 140 acronyms helpful in providing assurance services.  This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases. 

This two-hundred-sixty-five page (8.5 wide by 11 length) publication provides auditors and security professionals with an appreciation for the complexities associated with assuring information assets protection and list numerous references for further in-depth information.

“IT Auditing: Assuring Information Assets Protection” can function as a study guide for CISA or CISM examination preparation as well as an audit or security practice reference manual.

Feedback from an on-site version of this training includes:

"[The] Risk Based IT Audit Course provided a comprehensive understanding for both IT Auditors & IT Management in identifying risks & the risk of mitigating actions for them" 

- President & CEO from Pentathlon Systems Resources Inc.

Hardcover Edition - Lulu.com

Excerpt
Chapter 6

“IAP audit or review risk assessments should take into consideration the life cycle phase being examined (e.g. pre-implementation (design), implementation, or post-implementation (operational) stage). However, specific to an IT IAP audit or review, the planning risk assessment should include categories for addressing logical access controls, network infrastructure security, risk analysis, environmental controls, physical access controls, and confidential information assets (Appendix A).

When performing risk-based assurance engagements, IT auditors should consider training and awareness for each auditable unit category at the detail risk assessment level; while maintaining a separate classification for this subcategorized item at the audit-plan-auditable-unit-level for working papers, if this item is within the audit or review ambit.”

Chapter 1 Knowledge Check Answer

"Explanation: The purchasing agent has a conflict because they appear to lack objectivity. Ethics codes require that even the appearance of impropriety be avoided. Consequently, the agent should not have participated in the decision, however scrupulous their actions may have been. Therefore, yes, the presence of dual interest is sufficient to impugn the arrangement is the correct answer."


Want to review or comment on this book?
Click here to login!


Need a FREE Reader Membership?
Click here for your Membership!



Popular Business/Investing Books
  1. The Landlord's Bookkeeper
  2. Ancient Wisdom, Management and Negotiation
  3. The Property Manager's Guide to QuickBooks
  4. The Landlord's Bookkeeper
  5. Deciphering the 36 Chinese Stratagems
  6. The Landlord's Guide to a Successful Busin
  7. FREE A Critique of Piketty's Capital in th
  8. The Property Manager's Guide to QuickBooks
  9. The Landlord's Guide to a Successful Busin
  10. the Sexy little book of Finance II

The Concierge Manual by Katharine Giovanni

This extraordinary guide will provide you with all the tools that you need to become a successful concierge, personal assistant and/or errand service professional. ..  
BookAds by Silver, Gold and Platinum Members

Authors alphabetically: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Featured Authors | New to AuthorsDen? | Add AuthorsDen to your Site
Share AD with your friends | Need Help? | About us


Problem with this page?   Report it to AuthorsDen
© AuthorsDen, Inc. All rights reserved.