IT Auditing Using Controls to Protect Information Assets 2nd Edition, by Chris Davis, Mike Schiller and Kevin Wheeler explains tips on how to implement successful, enterprise-extensive IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included.
This comprehensive information describes how to assemble an efficient IT audit crew and maximize the value of the IT audit function. In-depth particulars on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and threat management techniques are also covered in this definitive resource.
IT Auditing Using Controls to Protect Information Assets 2nd Edition exhibits guidelines to construct and keep an internal IT audit perform with most effectiveness and value, audit entity-stage controls, knowledge facilities, and catastrophe recovery, look at switches, routers, and firewalls, evaluate Home windows, UNIX, and Linux working systems. We will know how you can evaluate the effectiveness of the security personnel function” by looking at documentation.
There are also complete guides to audit Web servers and purposes, analyze databases and storage solutions, assess WLAN and cell gadgets, audit virtualized environments, consider dangers related to cloud computing and outsourced operations, drill down into purposes to search out potential management weaknesses, use requirements and frameworks, such as COBIT, ITIL, and ISO so readers understand laws, including Sarbanes-Oxley, HIPAA, and PCI and find out how to implement confirmed danger management practices.
IT Auditing Using Controls to Protect Information Assets, 2nd Edition [Perfect Paperback]
Chris Davis, Mike Schiller and Kevin Wheeler
McGraw-Hill Osborne Media; 2 edition