Author: Nwabueze Ohia
Publisher:
ISBN: 9781973136262
Category :
Languages : en
Pages : 201
Book Description
Having issued the title "IT Infrastructure Risk and Vulnerability Library", which did well in identifying and consolidating most of the risk and vulnerabilities inherent in the commonly deployed IT Systems and Infrastructure in corporate organizations, it is pertinent to also discuss in details the controls that will be required in mitigating those risk/vulnerabilities in addition to audit test procedures that IT Auditors or other Assurance personnel will undertake to ensure that the controls put in place by their audit clients are adequate in minimizing if not eliminate the impact of the risk. Hence, the need to issue this title "Auditing Your Core Information Systems and IT Infrastructure (Practical Audit Programs/Checklists for Internal Auditors)".The book adopted the "risk", "controls" and "test procedure" methodology in highlighting what the Auditor needs to be testing and how they will carry out the test to ensure the effectiveness and adequacy of required controls or otherwise. Using this globally accepted method, which have been adopted by most corporations and research institutions worldwide, the title "Auditing Your Core Information Systems and IT Infrastructure" serves as a reference handbook for IT Auditors and other Assurance professionals and detailed how information systems and process controls can be tested to provide assurance on their effectiveness and adequacy. It documented series of task (audit steps) IT Auditors need to perform during their audit in the form of audit programs/checklists and can be used as a guide in performing audit reviews of the following areas.* Data centre.* Business continuity management and disaster recovery planning. * Business process re-engineering (BPR) and automation function. * IT governance and strategic planning.* Physical/environmental security and power supply adequacy.* Windows infrastructure, intranet and internet security.* Electronic banking and payment channels* UNIX operating system (AIX, Solaris and Linux infrastructure).* Core banking application (Finacle, Flexcube, Globus, Banks, Equinos, and Phoenix).* Payment card (debit, credit & prepaid) processes, systems and applications - PCIDSS Compliance.* Employee Information and Systems Security.* Perimeter Network Security.Intended for IT Auditors and other Assurance professionals that are desirous of improving their auditing skills or organizations that are performing risk and control self-assessment (RCSA) exercise from the ground up. What You Will Learn and Benefit:* Build or improve your auditing and control testing technics/skills by knowing what to look out for and how to verify the existence and adequacy of controls.* Acquire standard audit programs/checklists for auditing core IT systems and infrastructure, which can be applied in your environment.* Prepare for and pass such common certification audits as PCI-DSS, ISO 27001, ISO 2230, ISO 20000 and ISO 90001.* Audit programs/checklists from this book can easily be integrated into standard audit software such as Teammates and/or MKInsight given that they share common templates.* Expanding the scope of your audit testing to cover more areas of concerns or exposures.* Strengthen your organization's internal audit process and control testing.Who This Book Is For:IT professionals moving into auditing field; new IT Audit Managers, directors, project heads, and would-be CAEs and CISOs; security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals); and information security specialists (e.g. IT Security Managers, IT Risk Managers, IT Control implementers, CIOs, CTOs, COO).
Auditing Your Information Systems and IT Infrastructure
Author: Nwabueze Ohia
Publisher:
ISBN: 9781973136262
Category :
Languages : en
Pages : 201
Book Description
Having issued the title "IT Infrastructure Risk and Vulnerability Library", which did well in identifying and consolidating most of the risk and vulnerabilities inherent in the commonly deployed IT Systems and Infrastructure in corporate organizations, it is pertinent to also discuss in details the controls that will be required in mitigating those risk/vulnerabilities in addition to audit test procedures that IT Auditors or other Assurance personnel will undertake to ensure that the controls put in place by their audit clients are adequate in minimizing if not eliminate the impact of the risk. Hence, the need to issue this title "Auditing Your Core Information Systems and IT Infrastructure (Practical Audit Programs/Checklists for Internal Auditors)".The book adopted the "risk", "controls" and "test procedure" methodology in highlighting what the Auditor needs to be testing and how they will carry out the test to ensure the effectiveness and adequacy of required controls or otherwise. Using this globally accepted method, which have been adopted by most corporations and research institutions worldwide, the title "Auditing Your Core Information Systems and IT Infrastructure" serves as a reference handbook for IT Auditors and other Assurance professionals and detailed how information systems and process controls can be tested to provide assurance on their effectiveness and adequacy. It documented series of task (audit steps) IT Auditors need to perform during their audit in the form of audit programs/checklists and can be used as a guide in performing audit reviews of the following areas.* Data centre.* Business continuity management and disaster recovery planning. * Business process re-engineering (BPR) and automation function. * IT governance and strategic planning.* Physical/environmental security and power supply adequacy.* Windows infrastructure, intranet and internet security.* Electronic banking and payment channels* UNIX operating system (AIX, Solaris and Linux infrastructure).* Core banking application (Finacle, Flexcube, Globus, Banks, Equinos, and Phoenix).* Payment card (debit, credit & prepaid) processes, systems and applications - PCIDSS Compliance.* Employee Information and Systems Security.* Perimeter Network Security.Intended for IT Auditors and other Assurance professionals that are desirous of improving their auditing skills or organizations that are performing risk and control self-assessment (RCSA) exercise from the ground up. What You Will Learn and Benefit:* Build or improve your auditing and control testing technics/skills by knowing what to look out for and how to verify the existence and adequacy of controls.* Acquire standard audit programs/checklists for auditing core IT systems and infrastructure, which can be applied in your environment.* Prepare for and pass such common certification audits as PCI-DSS, ISO 27001, ISO 2230, ISO 20000 and ISO 90001.* Audit programs/checklists from this book can easily be integrated into standard audit software such as Teammates and/or MKInsight given that they share common templates.* Expanding the scope of your audit testing to cover more areas of concerns or exposures.* Strengthen your organization's internal audit process and control testing.Who This Book Is For:IT professionals moving into auditing field; new IT Audit Managers, directors, project heads, and would-be CAEs and CISOs; security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals); and information security specialists (e.g. IT Security Managers, IT Risk Managers, IT Control implementers, CIOs, CTOs, COO).
Publisher:
ISBN: 9781973136262
Category :
Languages : en
Pages : 201
Book Description
Having issued the title "IT Infrastructure Risk and Vulnerability Library", which did well in identifying and consolidating most of the risk and vulnerabilities inherent in the commonly deployed IT Systems and Infrastructure in corporate organizations, it is pertinent to also discuss in details the controls that will be required in mitigating those risk/vulnerabilities in addition to audit test procedures that IT Auditors or other Assurance personnel will undertake to ensure that the controls put in place by their audit clients are adequate in minimizing if not eliminate the impact of the risk. Hence, the need to issue this title "Auditing Your Core Information Systems and IT Infrastructure (Practical Audit Programs/Checklists for Internal Auditors)".The book adopted the "risk", "controls" and "test procedure" methodology in highlighting what the Auditor needs to be testing and how they will carry out the test to ensure the effectiveness and adequacy of required controls or otherwise. Using this globally accepted method, which have been adopted by most corporations and research institutions worldwide, the title "Auditing Your Core Information Systems and IT Infrastructure" serves as a reference handbook for IT Auditors and other Assurance professionals and detailed how information systems and process controls can be tested to provide assurance on their effectiveness and adequacy. It documented series of task (audit steps) IT Auditors need to perform during their audit in the form of audit programs/checklists and can be used as a guide in performing audit reviews of the following areas.* Data centre.* Business continuity management and disaster recovery planning. * Business process re-engineering (BPR) and automation function. * IT governance and strategic planning.* Physical/environmental security and power supply adequacy.* Windows infrastructure, intranet and internet security.* Electronic banking and payment channels* UNIX operating system (AIX, Solaris and Linux infrastructure).* Core banking application (Finacle, Flexcube, Globus, Banks, Equinos, and Phoenix).* Payment card (debit, credit & prepaid) processes, systems and applications - PCIDSS Compliance.* Employee Information and Systems Security.* Perimeter Network Security.Intended for IT Auditors and other Assurance professionals that are desirous of improving their auditing skills or organizations that are performing risk and control self-assessment (RCSA) exercise from the ground up. What You Will Learn and Benefit:* Build or improve your auditing and control testing technics/skills by knowing what to look out for and how to verify the existence and adequacy of controls.* Acquire standard audit programs/checklists for auditing core IT systems and infrastructure, which can be applied in your environment.* Prepare for and pass such common certification audits as PCI-DSS, ISO 27001, ISO 2230, ISO 20000 and ISO 90001.* Audit programs/checklists from this book can easily be integrated into standard audit software such as Teammates and/or MKInsight given that they share common templates.* Expanding the scope of your audit testing to cover more areas of concerns or exposures.* Strengthen your organization's internal audit process and control testing.Who This Book Is For:IT professionals moving into auditing field; new IT Audit Managers, directors, project heads, and would-be CAEs and CISOs; security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals); and information security specialists (e.g. IT Security Managers, IT Risk Managers, IT Control implementers, CIOs, CTOs, COO).
Auditing IT Infrastructures for Compliance
Author: Martin M. Weiss
Publisher: Jones & Bartlett Publishers
ISBN: 1284090701
Category : Business & Economics
Languages : en
Pages : 415
Book Description
"Auditing IT Infrastructures for Compliance, Second Edition provides a unique, in-depth look at U.S. based Information systems and IT infrastructures compliance laws in the public and private sector. This book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure
Publisher: Jones & Bartlett Publishers
ISBN: 1284090701
Category : Business & Economics
Languages : en
Pages : 415
Book Description
"Auditing IT Infrastructures for Compliance, Second Edition provides a unique, in-depth look at U.S. based Information systems and IT infrastructures compliance laws in the public and private sector. This book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure
Information Technology Control and Audit, Fifth Edition
Author: Angel R. Otero
Publisher: CRC Press
ISBN: 0429877323
Category : Computers
Languages : en
Pages : 514
Book Description
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor’s manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.
Publisher: CRC Press
ISBN: 0429877323
Category : Computers
Languages : en
Pages : 514
Book Description
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor’s manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.
IT Audit, Control, and Security
Author: Robert R. Moeller
Publisher: John Wiley & Sons
ISBN: 0470877685
Category : Business & Economics
Languages : en
Pages : 696
Book Description
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
Publisher: John Wiley & Sons
ISBN: 0470877685
Category : Business & Economics
Languages : en
Pages : 696
Book Description
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
Federal Information System Controls Audit Manual (FISCAM)
Author: Robert F. Dacey
Publisher: DIANE Publishing
ISBN: 1437914063
Category : Business & Economics
Languages : en
Pages : 601
Book Description
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.
Publisher: DIANE Publishing
ISBN: 1437914063
Category : Business & Economics
Languages : en
Pages : 601
Book Description
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.
Network Security Auditing
Author: Chris Jackson
Publisher: Cisco Press
ISBN: 1587059428
Category : Computers
Languages : en
Pages : 700
Book Description
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
Publisher: Cisco Press
ISBN: 1587059428
Category : Computers
Languages : en
Pages : 700
Book Description
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
CISA Certified Information Systems Auditor All-in-One Exam Guide
Author: Peter Gregory
Publisher: McGraw Hill Professional
ISBN: 0071643710
Category : Computers
Languages : en
Pages : 675
Book Description
"All-in-One is All You Need." CISA Certified Information Systems Auditor All in One Exam Guide Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this authoritative guide covers all six exam domains developed by the Information Systems Audit and Control Association (ISACA). You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CISA exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: IS audit process IT governance Network technology and security Systems and infrastructure lifestyle management IT service delivery and support Protection of information assets Physical security Business continuity and disaster recovery
Publisher: McGraw Hill Professional
ISBN: 0071643710
Category : Computers
Languages : en
Pages : 675
Book Description
"All-in-One is All You Need." CISA Certified Information Systems Auditor All in One Exam Guide Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this authoritative guide covers all six exam domains developed by the Information Systems Audit and Control Association (ISACA). You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CISA exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: IS audit process IT governance Network technology and security Systems and infrastructure lifestyle management IT service delivery and support Protection of information assets Physical security Business continuity and disaster recovery
Information Technology Control and Audit
Author: Frederick Gallegos
Publisher: Auerbach Publications
ISBN: 9780849399947
Category : Computers
Languages : en
Pages : 624
Book Description
As you know, today's complex computing environment and shrinking departmental budgets make it vital for IT auditors and security professionals to have practical guidance on conducting audits and ensuring security in today's stretched and quickly changing computing environments. Whether you're new to IT auditing or have years of experience, Information Technology Control and Audit provides you with tools and techniques to solve the audit, control, and security problems and issues you face today. It provides guidance on conducting IT audits on new and legacy systems, coverage of changes in financial and computing standards, explanations of the vulnerabilities of emerging systems, and tips on how to do your job more effectively.
Publisher: Auerbach Publications
ISBN: 9780849399947
Category : Computers
Languages : en
Pages : 624
Book Description
As you know, today's complex computing environment and shrinking departmental budgets make it vital for IT auditors and security professionals to have practical guidance on conducting audits and ensuring security in today's stretched and quickly changing computing environments. Whether you're new to IT auditing or have years of experience, Information Technology Control and Audit provides you with tools and techniques to solve the audit, control, and security problems and issues you face today. It provides guidance on conducting IT audits on new and legacy systems, coverage of changes in financial and computing standards, explanations of the vulnerabilities of emerging systems, and tips on how to do your job more effectively.
CISA Certified Information Systems Auditor Study Guide
Author: David L. Cannon
Publisher: John Wiley & Sons
ISBN: 1119056241
Category : Computers
Languages : en
Pages : 696
Book Description
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. Discover how much you already know by beginning with an assessment test Understand all content, knowledge, and tasks covered by the CISA exam Get more in-depths explanation and demonstrations with an all-new training video Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.
Publisher: John Wiley & Sons
ISBN: 1119056241
Category : Computers
Languages : en
Pages : 696
Book Description
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. Discover how much you already know by beginning with an assessment test Understand all content, knowledge, and tasks covered by the CISA exam Get more in-depths explanation and demonstrations with an all-new training video Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.
Auditing Information and Cyber Security Governance
Author: Robert E. Davis
Publisher: CRC Press
ISBN: 1000416089
Category : Business & Economics
Languages : en
Pages : 298
Book Description
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Publisher: CRC Press
ISBN: 1000416089
Category : Business & Economics
Languages : en
Pages : 298
Book Description
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.