Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

INDEX

A

AAA authentication, 132

AAA logging, 131

AAA servers, 129

absolute paths, 174

acceptance testing, 382

access control systems, 87

access controls

applications, 325–329

internal controls for, 37

physical access, 93–98

routers/switches, 132

SOX compliance, 422–423

third-party vendors, 75–76

web applications, 227–228

access points (APs), 295, 296–304

accounting fraud, 417–426

action plans, 49, 50, 53–55

Active Directory, 179–180

Address Resolution Protocol (ARP) tables, 304

administrative threats, 452–453

administrators

applications, 325–326

storage, 275–276

Unix/Linux, 186–187

virtualized environments, 284

Windows, 161–162

Advanced Research Projects Agency (ARPA), 119

Advanced Research Projects Agency Network (ARPANET), 119, 120

alarm systems, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382