Cyber Security and Privacy Control

Cyber Security and Privacy Control

This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that auditors should consider in their reviews of IT-based systems and processes. Second focus area includes IT Audit internal procedures. IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department is different, this section suggests best practices for an IT audit function and concludes with a discussion on the payment card industry data security standard data security standards (PCI-DSS), a guideline that has been developed by major credit card companies to help enterprises that process card payments prevent credit card fraud and to provide some protection from various credit security vulnerabilities and threats. IT auditors should understand the high-level key elements of this standard and incorporate it in their review where appropriate.


Author
Publisher John Wiley & Sons
Release Date
ISBN 1118035763
Pages 696 pages
Rating 4/5 (64 users)

More Books:

Cyber Security and Privacy Control
Language: en
Pages: 696
Authors: Robert R. Moeller
Categories: Business & Economics
Type: BOOK - Published: 2011-04-12 - Publisher: John Wiley & Sons

This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy
IT Audit, Control, and Security
Language: en
Pages: 696
Authors: Robert R. Moeller
Categories: Business & Economics
Type: BOOK - Published: 2010-10-12 - Publisher: John Wiley & Sons

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing
Security and Privacy Management, Techniques, and Protocols
Language: en
Pages: 426
Authors: Maleh, Yassine
Categories: Computers
Type: BOOK - Published: 2018-04-06 - Publisher: IGI Global

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain i
Cyber Security and Privacy
Language: en
Pages: 177
Authors: Massimo Felici
Categories: Computers
Type: BOOK - Published: 2013-10-23 - Publisher: Springer

This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full
Advances in Cyber Security
Language: en
Pages: 257
Authors: D. Frank Hsu
Categories: Computers
Type: BOOK - Published: 2013-03 - Publisher: Fordham Univ Press

Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives
Management of Information Security
Language: en
Pages: 672
Authors: Michael E. Whitman
Categories: Computers
Type: BOOK - Published: 2018-10-03 - Publisher: Cengage Learning

Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition, equips you with an executive-level overview of information security -- as well as the tools
Handbook of Research on Cyber Crime and Information Privacy
Language: en
Pages: 753
Authors: Cruz-Cunha, Maria Manuela
Categories: Computers
Type: BOOK - Published: 2020-08-21 - Publisher: IGI Global

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in infor
Cyber Security and Privacy
Language: en
Pages: 171
Authors: Frances Cleary
Categories: Computers
Type: BOOK - Published: 2014-11-17 - Publisher: Springer

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014.
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 1839
Authors: Management Association, Information Resources
Categories: Law
Type: BOOK - Published: 2019-06-07 - Publisher: IGI Global

The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemed
Cyber Security: Power and Technology
Language: en
Pages: 288
Authors: Martti Lehto
Categories: Technology & Engineering
Type: BOOK - Published: 2018-05-04 - Publisher: Springer

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber securi