Chapter 2. Evolution of Information Systems
Solutions in this chapter:
▪ The Primary Objective of Auditing
▪ The Threat Scene
▪ Attack Levels
▪ Policy > Procedure > Audit
Summary
Introduction
We have moved from mainframe interfaces and systems to microcomputers, then to network systems and now with virtualized enclaves, we are coming full circle. Throughout this evolution, auditors have had to describe feeds to and from the audited application by other applications including the methods of data transfer, security, changes of key data occurring and reflected in other systems.
To do this, it remains (as it has been) necessary to understand those controls which are in place to ensure interfaces are providing valid and accurate data between applications ...
Get The IT Regulatory and Standards Compliance Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.