IT Auditing Using Controls to Protect Information Assets, 2nd Edition

IT Auditing Using Controls to Protect Information Assets, 2nd Edition

Author: Chris Davis

Publisher: McGraw Hill Professional

Published: 2011-02-05

Total Pages: 513

ISBN-13: 0071742395

DOWNLOAD EBOOK

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices


Book Synopsis IT Auditing Using Controls to Protect Information Assets, 2nd Edition by : Chris Davis

Download or read book IT Auditing Using Controls to Protect Information Assets, 2nd Edition written by Chris Davis and published by McGraw Hill Professional. This book was released on 2011-02-05 with total page 513 pages. Available in PDF, EPUB and Kindle. Book excerpt: Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices


IT Auditing: Using Controls to Protect Information Assets

IT Auditing: Using Controls to Protect Information Assets

Author: Chris Davis

Publisher: McGraw Hill Professional

Published: 2007-01-12

Total Pages: 417

ISBN-13: 0071631763

DOWNLOAD EBOOK

Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses


Book Synopsis IT Auditing: Using Controls to Protect Information Assets by : Chris Davis

Download or read book IT Auditing: Using Controls to Protect Information Assets written by Chris Davis and published by McGraw Hill Professional. This book was released on 2007-01-12 with total page 417 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protect Your Systems with Proven IT Auditing Strategies "A must-have for auditors and IT professionals." -Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc. Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard. Build and maintain an IT audit function with maximum effectiveness and value Implement best practice IT audit processes and controls Analyze UNIX-, Linux-, and Windows-based operating systems Audit network routers, switches, firewalls, WLANs, and mobile devices Evaluate entity-level controls, data centers, and disaster recovery plans Examine Web servers, platforms, and applications for vulnerabilities Review databases for critical controls Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies Implement sound risk analysis and risk management practices Drill down into applications to find potential control weaknesses


IT Auditing Using Controls to Protect Information Assets, Third Edition

IT Auditing Using Controls to Protect Information Assets, Third Edition

Author: Mike Kegerreis

Publisher: McGraw Hill Professional

Published: 2019-09-30

Total Pages: 576

ISBN-13: 1260453235

DOWNLOAD EBOOK

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. • Build and maintain an internal IT audit function with maximum effectiveness and value • Audit entity-level controls and cybersecurity programs • Assess data centers and disaster recovery • Examine switches, routers, and firewalls • Evaluate Windows, UNIX, and Linux operating systems • Audit Web servers and applications • Analyze databases and storage solutions • Review big data and data repositories • Assess end user computer devices, including PCs and mobile devices • Audit virtualized environments • Evaluate risks associated with cloud computing and outsourced operations • Drill down into applications and projects to find potential control weaknesses • Learn best practices for auditing new technologies • Use standards and frameworks, such as COBIT, ITIL, and ISO • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI • Implement proven risk management practices


Book Synopsis IT Auditing Using Controls to Protect Information Assets, Third Edition by : Mike Kegerreis

Download or read book IT Auditing Using Controls to Protect Information Assets, Third Edition written by Mike Kegerreis and published by McGraw Hill Professional. This book was released on 2019-09-30 with total page 576 pages. Available in PDF, EPUB and Kindle. Book excerpt: Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. • Build and maintain an internal IT audit function with maximum effectiveness and value • Audit entity-level controls and cybersecurity programs • Assess data centers and disaster recovery • Examine switches, routers, and firewalls • Evaluate Windows, UNIX, and Linux operating systems • Audit Web servers and applications • Analyze databases and storage solutions • Review big data and data repositories • Assess end user computer devices, including PCs and mobile devices • Audit virtualized environments • Evaluate risks associated with cloud computing and outsourced operations • Drill down into applications and projects to find potential control weaknesses • Learn best practices for auditing new technologies • Use standards and frameworks, such as COBIT, ITIL, and ISO • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI • Implement proven risk management practices


IT Auditing

IT Auditing

Author: Mike Kegerreis

Publisher:

Published: 2019

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK


Book Synopsis IT Auditing by : Mike Kegerreis

Download or read book IT Auditing written by Mike Kegerreis and published by . This book was released on 2019 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt:


The Basics of IT Audit

The Basics of IT Audit

Author: Stephen D. Gantz

Publisher: Elsevier

Published: 2013-10-31

Total Pages: 271

ISBN-13: 0124171761

DOWNLOAD EBOOK

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit. Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the results Discusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of each Covers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIEC Includes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM


Book Synopsis The Basics of IT Audit by : Stephen D. Gantz

Download or read book The Basics of IT Audit written by Stephen D. Gantz and published by Elsevier. This book was released on 2013-10-31 with total page 271 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit. Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the results Discusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of each Covers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIEC Includes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM


IT Audit, Control, and Security

IT Audit, Control, and Security

Author: Robert R. Moeller

Publisher: John Wiley & Sons

Published: 2010-10-12

Total Pages: 696

ISBN-13: 0470877685

DOWNLOAD EBOOK

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.


Book Synopsis IT Audit, Control, and Security by : Robert R. Moeller

Download or read book IT Audit, Control, and Security written by Robert R. Moeller and published by John Wiley & Sons. This book was released on 2010-10-12 with total page 696 pages. Available in PDF, EPUB and Kindle. Book excerpt: When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.


Information Technology Control and Audit, Fifth Edition

Information Technology Control and Audit, Fifth Edition

Author: Angel R. Otero

Publisher: CRC Press

Published: 2018-07-27

Total Pages: 484

ISBN-13: 0429877323

DOWNLOAD EBOOK

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor’s manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.


Book Synopsis Information Technology Control and Audit, Fifth Edition by : Angel R. Otero

Download or read book Information Technology Control and Audit, Fifth Edition written by Angel R. Otero and published by CRC Press. This book was released on 2018-07-27 with total page 484 pages. Available in PDF, EPUB and Kindle. Book excerpt: The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor’s manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.


Auditing Information and Cyber Security Governance

Auditing Information and Cyber Security Governance

Author: Robert E. Davis

Publisher: CRC Press

Published: 2021-09-22

Total Pages: 298

ISBN-13: 1000416089

DOWNLOAD EBOOK

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.


Book Synopsis Auditing Information and Cyber Security Governance by : Robert E. Davis

Download or read book Auditing Information and Cyber Security Governance written by Robert E. Davis and published by CRC Press. This book was released on 2021-09-22 with total page 298 pages. Available in PDF, EPUB and Kindle. Book excerpt: "A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.


Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM)

Author: Robert F. Dacey

Publisher: DIANE Publishing

Published: 2010-11

Total Pages: 601

ISBN-13: 1437914063

DOWNLOAD EBOOK

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.


Book Synopsis Federal Information System Controls Audit Manual (FISCAM) by : Robert F. Dacey

Download or read book Federal Information System Controls Audit Manual (FISCAM) written by Robert F. Dacey and published by DIANE Publishing. This book was released on 2010-11 with total page 601 pages. Available in PDF, EPUB and Kindle. Book excerpt: FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.


Accounting Information Systems

Accounting Information Systems

Author: Leslie Turner

Publisher: John Wiley & Sons

Published: 2020-01-02

Total Pages: 592

ISBN-13: 1119577837

DOWNLOAD EBOOK

Accounting Information Systems provides a comprehensive knowledgebase of the systems that generate, evaluate, summarize, and report accounting information. Balancing technical concepts and student comprehension, this textbook introduces only the most-necessary technology in a clear and accessible style. The text focuses on business processes and accounting and IT controls, and includes discussion of relevant aspects of ethics and corporate governance. Relatable real-world examples and abundant end-of-chapter resources reinforce Accounting Information Systems (AIS) concepts and their use in day-to-day operation. Now in its fourth edition, this popular textbook explains IT controls using the AICPA Trust Services Principles framework—a comprehensive yet easy-to-understand framework of IT controls—and allows for incorporating hands-on learning to complement theoretical concepts. A full set of pedagogical features enables students to easily comprehend the material, understand data flow diagrams and document flowcharts, discuss case studies and examples, and successfully answer end-of-chapter questions. The book’s focus on ease of use, and its straightforward presentation of business processes and related controls, make it an ideal primary text for business or accounting students in AIS courses.


Book Synopsis Accounting Information Systems by : Leslie Turner

Download or read book Accounting Information Systems written by Leslie Turner and published by John Wiley & Sons. This book was released on 2020-01-02 with total page 592 pages. Available in PDF, EPUB and Kindle. Book excerpt: Accounting Information Systems provides a comprehensive knowledgebase of the systems that generate, evaluate, summarize, and report accounting information. Balancing technical concepts and student comprehension, this textbook introduces only the most-necessary technology in a clear and accessible style. The text focuses on business processes and accounting and IT controls, and includes discussion of relevant aspects of ethics and corporate governance. Relatable real-world examples and abundant end-of-chapter resources reinforce Accounting Information Systems (AIS) concepts and their use in day-to-day operation. Now in its fourth edition, this popular textbook explains IT controls using the AICPA Trust Services Principles framework—a comprehensive yet easy-to-understand framework of IT controls—and allows for incorporating hands-on learning to complement theoretical concepts. A full set of pedagogical features enables students to easily comprehend the material, understand data flow diagrams and document flowcharts, discuss case studies and examples, and successfully answer end-of-chapter questions. The book’s focus on ease of use, and its straightforward presentation of business processes and related controls, make it an ideal primary text for business or accounting students in AIS courses.