Information technology security audit

Results: 1663



#Item
31Software development / Information technology audit / COBIT / Privacy / Standards / Corporate governance of information technology / Information security management system / Information Criteria / Capability Maturity Model / Information technology management / Information technology governance / Project management

Microsoft Word - asist124-camera.docx

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:54:36
32Cross-platform software / Freenet / Bitcoin / Plausible deniability / Peer-to-peer / Internet / Document / Software / Computing / Information technology audit

Poster: Incentivized Censorship Resistance with Payment Contracts Cecylia Bocovich, John A. Doucette, Ian Goldberg University of Waterloo, School of Computer Science {cbocovic, j3doucet, iang}@uwaterloo.ca Waterloo, Onta

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
33Computer security / Auditing / Medeco / Roanoke County /  Virginia / Access control / Assa Abloy / Information technology security audit / Key / Security / Public safety / Locksmithing

1 eCylinders are uniquely designed to solve the often overlooked security vulnerabilities in today’s educational environments Protect Confidential Student Records

Add to Reading List

Source URL: www.medeco.com

Language: English - Date: 2013-03-27 10:32:19
34Voter-verified paper audit trail / Cryptography / Voting machine / Science / Technology / Sociology / Electronic voting / Election fraud / Information society

Verifying Security Properties in Electronic Voting Machines by Naveen K. Sastry B.S. (Cornell University) 2000

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:54
35Computing / Cloud computing security / Sarbanes–Oxley Act / Internal control / Cloud computing / Audit / Information technology controls / Governance /  risk management /  and compliance / Auditing / Accountancy / Business

Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this purpose, corpo

Add to Reading List

Source URL: www.cloudlock.com

Language: English - Date: 2015-05-27 09:39:22
36Water / International Maritime Organization / Law of the sea / Information technology audit / Data security / Security / Information security / Maritime security / United States Coast Guard / Transport

Appendix 3.2 — Competency Matrix for Port Facility Security 0fficers Source,MSC.1/Circ 1188, May 2006

Add to Reading List

Source URL: www.ilent.nl

Language: English - Date: 2015-05-12 10:23:27
37Crime prevention / National security / Risk / Computer security / Data security / Information security / Continuous auditing / Password / Audit / Security / Auditing / Information technology audit

DISCLAIMER The Suggested Answers hosted in the website do not constitute the basis for evaluation of the students’ answers in the examination. The answers are prepared by the Faculty of the Board of Studies with a view

Add to Reading List

Source URL: 220.227.161.86

Language: English - Date: 2014-08-07 03:30:32
38Usability / Technology / Audit / Systems engineering process / Data security / Business / IT risk management / Defence Science and Technology Agency / Information technology management / Human–computer interaction / Technical communication

Microsoft Word - NPOKI Consuting Services_11_Final _2_.doc

Add to Reading List

Source URL: www.npoki.org

Language: English - Date: 2009-12-21 17:56:42
39Security / Computer security / Auditing / Information Systems Audit and Control Association / Certified Information Security Manager / International Multilateral Partnership Against Cyber Threats / COBIT / Corporate governance of information technology / Certified Information Systems Auditor / Data security / Information technology management / Information technology audit

Isaca_Cybersecurity_r2_v6_8.5x11

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-03-27 10:28:47
40Auditing / Business / Enterprise risk management / Information technology audit / Security / Risk management / Chief risk officer / Milliman / Financial risk / Actuarial science / Management / Risk

Milliman Risk Institute Survey Preliminary results The inaugural survey from the Milliman Risk Institute

Add to Reading List

Source URL: us.milliman.com

Language: English - Date: 2013-01-07 20:30:42
UPDATE