Information technology security audit

Results: 1663



#Item
21Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:08
22Auditing / Management / Information technology audit / Security / Cryptography / Audit / Internal audit / Risk management / Computer security / Eide Bailly LLP / Information technology controls

fondo abstracto de tecnologia 3d.Lenguaje binario

Add to Reading List

Source URL: www.eidebailly.com

Language: English - Date: 2015-09-30 10:06:33
23Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
24Actuarial science / Auditing / Professional studies / Enterprise risk management / Information technology audit / Risk / Business / Security / Chief risk officer / ERM / Risk management

ENTERPRISE RISK MANAGEMENT POLICY Ref No 11

Add to Reading List

Source URL: www.pidm.gov.my

Language: English - Date: 2014-11-25 08:29:12
25Computer forensics / AT Attachment / Host protected area / Information technology audit / Center for Advanced Security Research Darmstadt / Device configuration overlay / Baier / International Monetary Fund / Anti-computer forensics / IMF

AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:53
26Auditing / Computer security / Information technology audit / Data security / Corporate governance / Internal audit / Chief audit executive / Audit / Information security / Information Technology Security Assessment / Corporate governance of information technology / Security controls

© JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)

Add to Reading List

Source URL: www.eco.gov.yk.ca

Language: English - Date: 2016-01-26 14:30:26
27

State Agency Information Systems: Reviewing Security Controls in Selected State Agencies Under the provisions of K.S.A, the Legislative Division of Post Audit conducts information technology security audits of s

Add to Reading List

Source URL: www.kslpa.org

- Date: 2015-12-21 13:20:20
    28Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    29Security / ISO/IEC 27001 / Audit / Information security / ISO/IEC 27006 / Information technology audit process / ISO/IEC 27000-series / Auditing / Accountancy / Risk

    Digital repository audit and certification Notes on the requirements for auditors February 4, 2009 At the face-to-face meeting in Berlin in October 2008, a start was made on adapting ISO 27006, “Requirements for bodies

    Add to Reading List

    Source URL: wiki.digitalrepositoryauditandcertification.org

    Language: English - Date: 2011-08-14 13:24:35
    30Security / Certified Information Systems Security Professional / Global Information Assurance Certification / (ISC)² / Information technology audit / ACIS / Information Systems Audit and Control Association / Penetration test / Computer security / Data security / Computing

    Prinya Hom-anek, CISSP, CSSLP, CRISC, SANS GIAC, GCFW President & Founder, ACIS Professional Centre, Thailand Member, (ISC)² Asian Advisory Board -------------------------------------------------------------------------

    Add to Reading List

    Source URL: www.informationsecurityasia.com

    Language: English - Date: 2012-07-19 00:22:00
    UPDATE