Threat Assessment and Security Measures Justification for Advanced IT Networks (Unknown language)

  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

Table of contents – Volume 1

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

4
IS Security Matters: Cloudy Daze
Ross, S.J. | 2010
4
IS Security Matters: IS Security Matters?
Ross, S.J. | 2010
5
Taking A Look Back: Who Is Melissa Chernobyl and Why Is She Doing These Terrible Things? Excerpted and reprinted from IS Audit & Control Journal, volume IV, 1999
| 2009
5
Issues & Comments Editor in Chief Michael Cangemi, CISA, CPA, discusses an Internet security policy forum, at which he spoke along with others from the industry and government, including Dr. Condoleezza Rice, US President George W. Bush's national security advisor. The forum's goal was to elevate computer security interest to the highest-level agendas of senior corporate management
| 2001
5
Editorial - Issues & Comments
Cangemi, Michael | 2003
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses how terrorist attacks will cause companies and governments to increase their investments in biometrics.
Cangemi, Michael | 2002
5
IS Security Matters: Compliance and Beyond
Ross, Steven J. | 2007
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, gives his account of this year's Annual General Meeting and the ISACA International Conference, which was held in Paris, France, in June 2001, and included the IT Governance Forum. He goes on to discuss the importance of IT governance and customer relationship management.
| 2001
5
Editorial - Issue & Comments
Cangemi, Michael | 2005
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA presents the ideas that came out of the Critical Infrastructure Assurance Summit in Washington DC and the results of the PricewaterhouseCoopers Technology Forecast
Cangemi, Michael P. | 2000
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, presents the annually popular AICPA Top Technology Priorities
Cangemi, Michael P. | 2000
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the issue of privacy and government intervention, technology and central banking and the new US Independence Rules. He also notes the importance of future donations to the foundation.
Cangemi, Michael | 2001
5
Taking A Look Back: Are We Really Doing Enough? The Current State of Computer Auditing Excerpted and reprinted from The EDP Auditor Journal, volume IV, 1991
| 2009
5
Guest Editorial: You Can't Outsource Control
Zarrella, Edge | 2008
5
Guest Editorial: Breaking the Coconut
Penri-Williams, Hugh H. | 2007
5
Guest Editorial: Dysfunctional IT -- A Business Issue
Nicholson, Howard | 2008
5
Guest Editorial: A Rogue Trader Strikes Again!
Sarup, Deepak | 2008
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, highlights the importance of improving credibility of financial reporting. He also discusses the double-edged sword of customer relationship management.
Cangemi, Michael | 2002
5
Issues&Comments
Cangemi, Michael | 2002
5
Editorial - Issues & Comments - Examines the future of electronic commerce, calling it a bright future, despite the recent downturn in the IT industry. He goes on to call business professionals not to lose sight of the opportunities the Internet presents to reinvent business models.
Cangemi, Chief Michael | 2001
5
Taking a Look Back: Data Security Excerpted and reprinted from The EDP Auditor Journal, Winter 1980
| 2009
5
Guest Editorial: Extinction or Renewal -- The CIO at a Crossroad
Sarup, Deepak | 2007
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA discusses corporate governance and lessons learned in regard to Enron. He also discusses the role of corporate governance in preventing cybercrime.
Cangemi, Michael | 2002
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA addresses one of the greatest threats to a business or company: Misuse of e-mail. Among other topics, he also addresses corporate governance and accounting for earnings in the United States
Cangemi, Michael P. | 2000
5
Guest Editorial: Running IT as a Business: IT Metrics Propel Transformation
Kress, Bob | 2008
5
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act Excerpted and reprinted from IS Audit & Control Journal, volume 1, 2004
| 2009
5
Guest Editorial: IT Governance Comes of Age
Holt, Alison | 2008
5
Guest Editorial: Mobility Changes (Almost) Everything!
Boni, William C. | 2008
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses an Internet security policy forum, at which he spoke along with others from the industry and government, including Dr. Condoleezza Rice, US President George W. Bush's national security advisor. The forum's goat was to elevate computer security interest to the highest-level agendas of senior corporate management.
Cangemi, Michael | 2001
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, announces a unique issue of the Information Systems Control Journal, one devoted to IT governance and lends his thoughts on how the topic is aligned with the ISACA vision statement
Cangemi, Michael P. | 2000
5
The Reality We Can All Agree On
Bostick, J. | 2009
5
Editorial - Issues & Comments - Editor in Chief Michael P. Cangemi, CISA, CPA, discusses the role of the board in information security, IT governance and the foundation's 25th anniversary, then proudly declares himself an IT optimist.
Cangemi, Michael P. | 2001
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States.
Cangemi, Michael | 2002
5
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CPA, discusses the influence technology, the rise of Internet use and business changes in general have had on both fashion trends and web use by women. He also talks about the age-old scandals encountered by Wall Street.
Cangemi, Michael P. | 2000
5
The new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States
Cangemi, M. | 2002
5
Dysfunctional IT-A Business Issue
Nicholson, H. | 2008
5
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.?
| 2009
5
Editodal - Issues & Comments
Cangemi, Michael | 2005
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses an acronym bandied about -- ASP. Application software providers base software utilization on usage, as opposed to wrestling with upgrades and new versions of software
Cangemi, Michael P. | 2000
5
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CK discusses biometrics, the joy of book collecting and e-business, and notes the passing of an IS audit pioneer. A list of biometrics vendors accompanies the column.
Cangemi, Michael P. | 2001
6
Guest Editorial: Building Bridges: IT as an Enabler of GRC Convergence
Anand, S. | 2009
6
Guest Editorial: Business Reform and Change Enabled by IT-An Alternative Perspective
Hayes, T. | 2009
6
Guest Editorial: Managing IT Governance Through Market Turbulence
Zarrella, E. | 2009
6
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part II)
Singleton, T.W. | 2010
6
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)
Singleton, T.W. | 2010
7
Connections Galorel
Sethuraman, S. | 2009
7
IS Security Matters: Dumb Luck, Smart Risk
Ross, Steven | 2008
7
Guest Editorial: The IT Security Professional: Bright Spot in a Dreary Economy
Foote, D. | 2009
8
Identity Architecture
Ross, S. J. | 2003
8
IT Security Matters: Alerts, Alarms and Triggers
Ross, Steven J. | 2007
8
IS Security Matters - Identity Architecture
Ross, Steven J. | 2003
8
IS Security Matters - The Vanished Perimeter
Ross, Steven J. | 2003
8
IS Security Matters: Converging Need, Diverging Response
Ross, Steven J. | 2006
8
IS Security Matters: The Right Question
Ross, Steven J. | 2006
8
IS Security Matters: Professor Watts Explains It All
Ross, Steven J. | 2007
8
IS Security Matters: Contents and Context
Ross, Steven J. | 2006
8
Identifier Management
Ross, S. J. | 2003
8
IS Security Matters - No Harm, No Foul
Ross, Steven J. | 2003
8
e-Commerce Security: Trading Partner Identification, Registration and Enrollment
Kinczkowski, L. M. | 2002
8
Information Security and the Resilient Enterprise
Ross, S. J. | 2005
8
IS Security Matters: Paris Hilton's Privacy
Ross, Steven J. | 2005
8
Auditing and Security: AS/400, NT, UNIX, Networks and Disaster Recovery Plans
McMinn, J. | 2002
8
IS Security Matters - Loose Lips Sink Chips
Ross, Steven | 2002
8
IS Security Matters: Is Information Security a Threat to Resilience?
Ross, Steven J. | 2005
8
The Vanished Perimeter
Ross, S. J. | 2003
8
IS Security Matters: There Oughta Be a Law
Ross, S. J. | 2006
8
Book Review - Auditing and Security: AS-400, NT, UNIX, Networks and Disaster Recovery Plans - This book is an excellent text on the issues that IT auditors need to concentrate on to successfully audit the more common operating systems of AS-400, NT and UNIX, as well as networks.
McMinn, Janine | 2002
8
Loose Lips Sink Chips
Ross, S. | 2002
8
No Harm, No Foul
Ross, S. J. | 2003
8
Paris Hilton's Privacy
Ross, S. J. | 2005
8
IS Security Matters - Identifier Management
Ross, Steven J. | 2003
8
IS Security Matters: Information Security and the Resilient Enterprise
Ross, Steven J. | 2005
9
Intrusion Signatures and Analysis
Jelleyman, A. | 2002
9
Lessons from Tragedy, Revisited
Ross, S. | 2003
9
IS Security Matters: Managing Information Crises
Ross, Steven J. | 2008
9
IS Security Matters: Give 'em the New Razzle-Dazzle
Ross, S. J. | 2005
9
COBIT® Management Guidelines
Elysee, M. | 2001
9
Strategies for Information Technology Governance
Tsang-Reveche, C. | 2004
9
Instant Mess
Ross, S. J. | 2004
9
Book Reviews - Security Provisioning: Managing Access in Extended Enterprise
Oliver, Derek J. | 2002
9
IT Audit Basics: Emerging Technical Standards on Financial Audits: How IT Auditors Gather Evidence to Evaluate Internal Controls
Singleton, Tommie | 2007
9
IS Security Matters: Resilience Transformation
Ross, Steven J. | 2008
9
IS Security Matters: Reliable Security
Ross, Steven J. | 2008
9
IS Security Matters: Falling Off the Truck
Ross, Steven J. | 2006
9
IS Security Matters: Give 'em the New Razlle-Dazzle
Ross, Steven J. | 2005
9
Book Review - E-Commerce Security -- Public Key Infrastructure: Good Practices for Secure Communications - The review discusses the concise and comprehensive manner in which book explains PKI, its relationship to e-commerce and its ability to mitigate certain risks.
Bria, Ricardo | 2001
9
IS Security Matters - "Fishy Stories" - Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes, such as violation of software licenses in relation to an auditor's need to use statistics to budget for security
Ross, Steve | 2000
9
Who Needs Information Security?
Ross, S. J. | 2003
9
IS Security Matters: The Resilient Toothbrush
Ross, Steven J. | 2008
9
the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investment
Ross, S. J. | 2002
9
Security Provisioning: Managing Access in Extended Enterprise
Oliver, D. J. | 2002
9
IS Security Matters - Eternal Truth and the Next New Thing - Steven J Ross, CISA, examines the security issues and practices that growing in complexity and importance as a result of the emergence of commerce. Specifically, he makes a case for basing information seen with change as its constant underpinning.
Ross, Steven J. | 2000
9
IS Security Matters - Frameworkers of the World, Unite
Ross, Steven J. | 2004
9
IS Security Matters: Let's Go, Vets
Ross, S.J. | 2009
9
IS Security Matters: Certification and the Disappearing Perimeter
Ross, Steven J. | 2008
9
IT Audit Basics: The COSO Model: How IT Audtiors Can Use IT to Measure the Effectiveness on Internal Controls (Part 2)
Singleton, Tommie W. | 2008
9
IT Security Matters: Mail Call III
Ross, Steven J. | 2007
9
IS Security Matters: Standard Deviation
Ross, Steven J. | 2006
9
IS Security Matters - Instant Mess
Ross, Steven J. | 2004
9
IS Security Matters - "Lingering Doubt" - Steve Ross, CISA, addresses the puzzlement when survey respondents answer questions one way, yet hold opinions in another direction
Ross, Steve | 2000
9
"Lingering Doubt"
Ross, S. | 2000
9
Mahogany Row Mail Call While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing
| 2001
9
IS Security Matters: Automating Compliance
Ross, Steven J. | 2007
9
The Art of Deception: Controlling the Human Element of Security
McMinn, J. | 2004
9
Mail Call II
Ross, S. J. | 2004
9
"Fishy Stories" Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes
| 2000
9
IS Security Matters: I'm Not the Sheriff
Ross, Steven | 2007
9
IS Security Matters - Who Needs Information Security?
Ross, Steven J. | 2003
9
IS Security Matters - Maybe We Have Won
Ross, Steven J. | 2004
9
IS Security Matters - Mail Call II
Ross, Steven J. | 2004
9
Claves Para El Gobierno de los Systemas de Informacion, comentarios Las notas a este libro presentan como los autores integran informacion sobre controles, planificacion de contingencias, mejora de procesos, tratamiento de recursos humanos, restricciones legales en las organizaciones y el marco de referencia COBIT⊙
Tello, J. | 2001
9
Netspionage: The Global Threat to Information
Lambert, M. | 2001
9
Frameworkers of the World, Unite
Ross, S. J. | 2004
9
Maybe We Have Won
Ross, S. J. | 2004
9
IS Security Matters: Four Little Words
Ross, S.J. | 2009
9
Book Review - Digital Signatures Security and Control - The review notes the book's aim of providing clarity on the central issues surrounding the safe use of the web for normal business and commercial activities and describes the content of each of its seven chapters.
Backhouse, James | 2001
9
IS Security Matters - Lessons from Tragedy, Revisited
Ross, Steven | 2003
9
IS Security Matters - Mahogany Row Mail Call - While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing.
Ross, Steven J. | 2001
9
E-commerce Security-Public Key Infrastructure: Good Practices for Secure Communications
Bria, R. | 2001
9
IS Security Matters: Gang Aft Agley
Ross, S.J. | 2009
9
IS Security Matters: Reliable Security, Revisited
Ross, S. | 2009
9
Eternal Truth and the Next New Thing the security issues and practices that are growing in complexity and importance as a result of the emergence of ecommerce. Specifically, he makes a case for basing information security with change as its constant underpinning
Ross, S. J. | 2000
9
Digital Signatures Security and Control
Backhouse, J. | 2001
9
IS Security Matters - Steve Ross, CISA, considers privacy and the predictions of dire consequences related to the advance of technology and the growth of the Internet. He counters these predictions by presenting how market forces currently keep violations of privacy under control
Ross, Steve | 2000
9
IS Security Matters - Steve Ross, CISA, approaches DDoS from the prevention of the outages in the first place. To illustrate his points, he sets forth conceptual specifications for this architecture
Ross, Steve | 2000
9
IS Security Matters - ROSI Scenarios - Steven J. Ross, CISA, discusses the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investment.
Ross, Steven J. | 2002
10
Standards. Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance
| 2003
10
IS Security Matters - Mail Call - Steven J. Ross, CISA, responds to mail he received in response to previous columns on topics including the value of international standards, virtual private infrastructures and the tragedies of 11 September 2001.
Ross, Steven J. | 2002
10
Data Plumbing?
Ross, S.J. | 2009
18
Five Questions With...
Karygiannis, Tom | 2008
10
ISACA Member and CISA Compliance
| 2002
10
Standards, Statements, Guidelines - ISACA Member and CISA Compliance
| 2002
10
Vive le ROI
Ross, S. J. | 2002
10
Book Reviews - Security Audit and Control Features SAP(R) R-3(R): A Technical and Risk Management Reference Guide
Christodoulides, Michael | 2002
10
Help Source Q & A
Lilly, F. | 2004
10
What's Your Sign?
Ross, S. J. | 2000
10
IS Security Matters - Vive le ROI - Steven J. Ross, CISA, discusses the return on investment conundrum that exists when investing in security. Investing in security is not like investing in stocks and bonds. One cannot put money in and simply wait for dividends and growth.
Ross, Steven J. | 2002
10
IS Security Matters - What's Your Sign? - Steven J Ross, CISA, delves into what a signature, digital or otherwise, actually denotes and-or obligates
Ross, Steven J. | 2000
10
Security Audit and Control Features SAP® R/3®: A Technical and Risk Management Reference Guide
Christodoulides, M. | 2002
10
Help Source - Help Source Q & A
Lilly, Fred | 2004
11
IT Audit Basics: What Every IT Auditor Should Know About Access Controls
Singleton, Tommie W. | 2008
11
IT Audit Basics: Auditing Business Continuity
Sayana, S.Anantha | 2005
11
IT Audit Basics: COBIT -- A Key to Success as an IT Auditor
Singleton, Tommie W. | 2006
11
IS Security Matters: Downtime and Data Loss
Ross, Steven J. | 2006
11
Book Review - Virtual Private Networking -- New Issues For Network Security - The review breaks down the book chapter by chapter. The reviewer describes the book as a guide covering the pre-implementation, implementation and post-implementation phases of a VPN project.
Abdullah, Abdul Hamid Bin | 2001
11
Is Security Matters - Lessons from Tragedy - Steven J. Ross, CISA, provides his perspective of the recent terrorist attacks and examines the valuable lessons that businesses can learn from the events as they, the US and the world recover and prepare for the future.
Ross, Steven J. | 2002
11
IT Audit Basics: Audit Concerns: Looking at ERP Application Integration and Implementation Issues
Gallegos, Fred | 2006
11
Network Security: The Complete Reference
Parmar, K. | 2004
11
Virtual Private Networking-New Issues For Network Security
Abdullah, A. H. B. | 2001
11
The Definitive Handbook of Business Continuity Management, by Andrew Hiles and Peter Barnes
Sarathy, E. | 2001
11
IT Audit Basics: Beyond the IT in IT Audit
Singleton, Tommie | 2008
11
differing, demand-driven international standards developed and disseminated after the market has decided which is best, not before
Ross, S. J. | 2001
11
Financial Information Systems Manual 1999 Edition
Emani, S. | 2000
11
The Ramifications of Sarbanes-Oxley
Singleton, T. | 2003
11
DB2 Audit Guideline
Hauck, J. / Likogiorgos, S. / Toth, L. / Wong, B. | 2003
11
IT Audit Basics: Sarbanes-Oxley Status
Gallegos, Frederick | 2005
11
IT Audit Basics: Generalized Audit Software: Effective and Efficient Tool for Today's IT Audits
Singleton, Tommie | 2006
11
IT Audit Basics - Strategy Issues: Sarbanes-Oxley Is Only Part of the Solution
Gallegos, Frederick | 2004
11
Commentary - The Ramifications of Sarbanes-Oxley
Singleton, Tommie | 2003
11
IT Audit Basics - Audit of Outsourcing
Sayana, S.Anantha | 2004
11
Penetrating Questions Steven J. Ross discusses society's glorification of the hacker, the difference between a penetration tester and a criminal-the skills are the same, it is just a difference in application and integrity, and the importance of penetration testers
| 2001
11
Sarbanes-Oxley Status
Gallegos, F. | 2005
11
e-Commerce Security-Business Continuity Planning
Kinczkowski, L. M. | 2003
11
IT Value: Securing Value: Treasure Buried in Business Cases
Tieman, Chris | 2007
11
Book Reviews - Financial Information Systems Manual 1999 Edition - An overview of the 1999 edition of this manual, which covers the requirements, design, implementation and management of financial information systems
Emani, Sarathy | 2000
11
IT Value: Value Management Principles
Guldentops, Erik | 2007
11
IS Security Matters - Standard Questions - Steven J Ross, CISA, calls for differing, demand-driven international standards developed and disseminated after the market has decided which is best, not before.
Ross, Steven J. | 2001
11
Strategy Issues: Sarbanes-Oxley Is Only Part of the Solution
Gallegos, F. | 2004
11
IT Audit Basics: Auditing Realization of Benefits from IT
Sayana, S.Anantha | 2005
11
Lessons from Tragedy
Ross, S. J. | 2002
11
Auditing Realization of Benefits from IT
Sayana, S. A. | 2005
11
Audit of Outsourcing
Sayana, S. A. | 2004
11
IS Security Matters - Penetrating Questions - Steven J Ross discusses society's glorification of the hacker, the difference between a penetration tester and a criminal -- The skills are the same, it is just a difference in application and integrity, and the importance of penetration testers.
Ross, Steven J. | 2001
12
IT Audit Basics: What Every IT Auditor Should Know About Frauds
Singleton, Tommie W. | 2008
12
IS Security Matters - Privacy Parts
Ross, Steven | 2002
12
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for ISACATM membership and the CISAa designation are outlined and the status of ISACA issuances noted.
| 2002
12
Applying IT Governance at Home: Oversight of a Computer Acquisition
Lawton, L. | 2002
12
Risk-aware Decision Making for New IT Investments
Ataya, G. | 2003
12
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.
| 2002
12
IT Audit Basics: What Every IT Auditor Should Know About Scoping an IT Audit
Singleton, T.W. | 2009
12
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA® designation are outlined and the status of ISACA issuances noted
| 2002
12
IT Audit Basics: What Every IT Auditor Should Know About Identity Theft
Singleton, T. W. | 2006
12
IS Security Matters: People Impacting Events
Ross, S.J. | 2009
12
The Definitive Handbook of Business Continuity Management, 2^n^d Edition
Rafeq, A. | 2010
12
Risks of Customer Relationship Management: A Security, Control and Audit Approach
Ballance, C. | 2003
12
IT Governance - Applying IT Governance at Home: Oversight of a Computer Acquisition
Lawton, Lynn | 2002
12
IT Audit Basics: What Every IT Auditor Should Know About Auditing Virtual Machine Technology
Singleton, Tommie W. | 2008
12
IT Audit Basics: What Every IT Auditor Should Know About IT Audits and Data
Singleton, T.W. | 2009
12
Privacy Parts
Ross, S. | 2002
12
IT Governance - Risk-aware Decision Making for New IT Investments
Ataya, Georges | 2003
13
e-Commerce Security-Network Perimeter Security By Deloitte & Touche
Mansour, C. | 2003
13
IT Audit Basics: What Every IT Auditor Should Know About Sampling
Singleton, T.W. | 2009
13
Report from the Year 2000: IS Audit Recruitment
Tuck, R. | 2000
13
IS Security Matters - Virtual Private Infrastructure - Examines the security concerns that arise with the advent of the virtual private infrastructure the use of personal-home computers by employees for business purposes.
Ross, Steven J. | 2001
13
IS Security Matters - Why Passwords Persist - Steven J Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures.
Ross, Steven J. | 2001
13
IT Audit Basics - Educating the Masses: Audit, Control and Security of Information Systems Today and Tomorrow
Gallegos, Frederick | 2004
13
IT Audit Basics: Computer Forensics: An Overview
Gallegos, Frederick | 2006
13
Book Reviews - Network Intrusion Detection -- An Analyst's Handbook - A look at a book which enables anyone to understand and take part in network intrusion detection work
Whittaker, James | 2000
13
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.
| 2002
13
Educating the Masses: Audit, Control and Security of Information Systems Today and Tomorrow
Gallegos, F. | 2004
13
Activity-Based Information Systems
Nair, M. | 2000
13
Book Reviews - COBIT Advisor 2nd Edition - Although there are two book reviews by two different authors for this book, the editors believed both to be of value. One focuses on what a person needs to know about COBIT to use COBIT Advisor. The other review walks the reader through practical applications of COBIT Advisor in one's work world
| 2000
13
IT Audit Basics: Auditing IT Service Delivery
Sayana, S.Anantha | 2005
13
IT Audit Basics: What Every IT Auditor Should Know About Cybercrimes
Singleton, Tommie W. | 2008
13
Management Guidelines for COBIT what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governance
Roussey, R. S. | 2000
13
COBIT Advisor 2nd Edition
| 2000
13
Corporate Governance
Sel, M. | 2004
13
IT Governance: Outsourcing IT Governance to Deliver Business Value
Blecher, Max | 2007
13
IT Governance: Dysfunctional Operations in IT
Anderson, Kent | 2008
13
IT Audit Basics: IT Audit Education and Professional Development
Singleton, Tommie | 2007
13
Book Reviews - Effective Use of Teams for IT Audits
Krist, Martin A. | 2000
13
IS Security Matters - Modeling Resiliency
Ross, Steven J. | 2004
13
Why Passwords Persist Steven J. Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures
| 2001
13
Effective Use of Teams for IT Audits
Krist, M. A. | 2000
13
Auditing: A Risk Analysis Approach, 5^t^h Edition-By Larry F. Konrath
Bettex, E. J. | 2003
13
Emerging Topics and Technologies in Information Systems
Kanhere, V. | 2010
13
IT Audit Basics: What Every IT Auditor Should Know About the New Risk Suite Standards
Singleton, Tommie W. | 2007
13
Perspectives - Report from the Year 2000: IS Audit Recruitment - The president and founder of the world's largest IS audit recruiting firm describes what he sees on the horizon both for auditors and the corporations and organizations that wish to hire them
Tuck, Richard | 2000
13
Modeling Resiliency
Ross, S. J. | 2004
13
Asking the Right Questions for IT Governance Erik Guldentops, CISA, presents a view of the importance of and need for corporate governance regulations and standards for overall enterprise governance. He notes that while it is not the most efficient IT governance process, asking the tough questions is an effective way to get started. To this effect, he provides a list of questions to help an organization begin
| 2001
13
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISAx designation are outlined and the status of ISACA issuances noted.
| 2002
13
Global Perspectives: The View of and Approach Toward Cybercrime
Cilli, Claudio / Townsend, Andy / Alegue, Gilbert N. | 2006
13
IT Audit Basics: The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal Controls
Singleton, Tommie | 2007
13
Network Intrusion Detection - An Analyst's Handbook
Whittaker, J. | 2000
13
IT Audit Basics: What Every IT Auditor Should Know About Controls: The CDLC
Singletn, T.W. | 2009
13
Standards and guidelines for maintaining compliance for ISACA™ membership and the CISA® designation are outlined and the status of ISACA issuances noted
| 2002
13
Standards, Statements, Guideliness - Standard, and guidelines for maintaining compliance for both ISACA" membership and the CISAe designation are outlined and the status of ISACA issuances noted.
| 2001
13
IT Governance - Asking the Right Questions for IT Governance - Erik Guldentops, CISA, presents a view of the importance of and need for corporate governance regulations and standards for overall enterprise governance. He notes that while it is not the most efficient IT governance process, asking the tough questions is an effective way to get started. To this effect, he provides a list of questions to help an organization begin.
Guldentops, Erik | 2001
13
Book Reviews - e-Commerce Security -- Network Perimeter Security
Deloitte / Touche / Mansour, Charles | 2003
13
Virtual Private Infrastructure
Ross, S. J. | 2001
13
IT Governance: Information Security Governance: Who Needs It?
Brotby, Krag | 2007
13
Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3^r^d Edition
McMinn, J. / Simon, M. | 2003
13
IT Governance - Corporate Governance
Sel, Marc | 2004
13
Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA^o designation are outlined and the status of ISACA issuances noted
| 2001
13
Perspective - Management Guidelines for COBIT - This article describes what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governance.
Roussev, Robert S. | 2000
14
IT Governance - Make Sure Management and IT Are on the Same Page: Implementing an IT Governance Framework - Gary Hardy examines the management of IT through an IT governance framework. To govern IT effectively, it is important to appreciate the activities and risks within IT that need to be managed. Using the CoBiT Framework's four domains and the IT processes, he breaks this down -- Looking at it logically from a top management perspective.
Hardy, Gary | 2002
14
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance
| 2006
14
Statutory Audit and IT Governance
Guldentops, E. | 2003
14
IT Governance: IT Governance Global Status Report 2008: An Excerpt
Steuperaert, Dirk | 2008
14
The Many Faces of IT Governance: Crafting an IT Governance Architecture
Robinson, Nick | 2007
14
ISACA® Member and Certification Holder Compliance
| 2004
14
The Business Value of IT
de la Fuente, R.J. | 2010
14
IT Governance - Statutory Audit and IT Governance
Guldentops, Erik | 2003
14
IT Governance: Security Folklore, Facts and the Future
Southgate, Roger | 2005
14
IT Audit Basics: IT and Privacy Audits
Singleton, T.W. | 2009
14
Make Sure Management and IT Are on the Same Page: Implementing an IT Governance Framework
Hardy, G. | 2002
15
IT Value: Five Critical Success Factors for Introducing Val IT
Harries, S. / Harrison, P. | 2009
15
IT Value: The Drive for Value Management
Thorp, John | 2008
15
Guest Editorial: Insights From Nature-An Alternate Approach to Information Security
Sayana, S.A. | 2010
15
Kennametal Uses ACL as Its Best Practices Tool
McMunn, H. | 2000
15
The Vest-Pocket Guide to Information Technology
Shim, J. K. / Siegel, J. G. / Chi, R. | 2000
15
IT Governance - Spotlight on Governance
Hamaker, Stacey | 2003
15
Perspective - When IT Lets the Business Down - A summary of remarks made by ISACA-F International President Paul A. Williams at the International Conference 2000.
Williams, Paul A. | 2000
15
Book Reviews - The Vest-Pocket Guide to Information Technology - Both of these books, reviewed by Sarathy Emani, CISA, received high marks from the reviewer. Both contain the promised information their titles indicate
Shim, Jae K. / Siegel, Joel G. / Chi, Robert / Emani, Sarathy | 2000
15
Case Study - Kennametal Uses ACL as Its Best Practices Tool - Security and data integrity are major issues when moving from legacy systems to new enterprise management systems. Holly McMunn, CPA, CIA, the manager of internal audit at Kennametal, describes their use of ACL for Windows during post-implementation audits of SAP
McMunn, Holly | 2000
15
Auditing Security and Privacy in ERP Applications
Sayana, S. A. | 2004
15
IT Governance: Driving Value From Information Security: A Governance Perspective
Kanhere, V. | 2009
15
Book Reviews - The Audit Committee Handbook, Third Edition - Sarathy Emani, CISA, reviews this book which he describes as containing extensive coverage of statutory standards and guidelines designed for audit committees
Emani, Sarathy | 2000
15
Knowing the Environment: Top Five IT issues
Guldentops, E. | 2002
15
Auditor's Risk Management Guide-Integrating Auditing and ERM
Sarathy, E. | 2003
15
Stepping Through the IS Audit
Bayuk, J. | 2000
15
ISecurity Matters - Is the Future Unpredictable?
Ross, Steven J. | 2004
15
Plus - HelpSource Q & A
Lilly, Fred L. | 2001
15
More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT Governance
Capozzi, M. / Singleton, J. | 2002
15
Is the Future Unpredictable?
Ross, S. J. | 2004
15
IT Governance - More Than a Specialized Concern:Survey of public Sector Board Members Has Implications for IT Governance - Maria Capozzi, MPA, BA, and Jon Singleton, CISA, CA, explore a recent study that examines the board governance practices of various public sector boards within the government reporting entity, completed by Canada's Provincial Auditor's Office, and how the results can be considered in the context of IT governance.
Capozzi, Maria / Singleton, Jon | 2002
15
The Audit Committee Handbook, Third Edition
Emani, S. | 2000
15
What Every IT Auditor Should Know About IT Risk Assessment
Singleton, T.W. | 2009
15
Did We Hear the Warning Shot?
Suan, B.H. | 2010
15
Maturity Measurement-First the Purpose, Then the Method
Guldentops, E. | 2003
15
Spotlight on Governance
Hamaker, S. | 2003
15
When IT Lets the Business Down A summary of remarks made by ISACA/F International President Paul A. Williams at the International Conference 2000
Williams, P. A. | 2000
15
Role-based Access Control (RBAC)
de la Fuente, R. J. | 2004
15
Commentary - Maturity Measurement -- First the Purpose, Then the Method
Guldentops, Erik | 2003
15
IS Security Matters - Doctor's Orders - Steven J. Ross, CISA, examines the information security architecture laid out in the US Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implications. He asks the question: Should government in the security architecture business at all? He points out that if the law can be applied to healthcare, it can be applied to any industry and, for that matter, to any country.
Ross, Steven J. | 2001
15
IT Governance - Knowing the Environment: Top Five IT Issues - Erik Guldentops, CISA, discusses the most pressing IT issues of the day. The list, developed by the IT Governance Institute, views the important IT issues to be governance-related, not technology-related.
Guldentops, Erik | 2002
15
IT Audit Basics - Auditing Security and Privacy in ERP Applications
Sayana, S.Anantha | 2004
16
IT Value: Val IT Framework 2.0 -- Adding Breadth and Depth to the Value Management Road Map
Thorp, John | 2008
16
Book Review: Phishing and Countermeasures: Understanding the Increasing Problem of Identity Theft
Kanhere, Vishnu | 2008
16
Fraud Examination & Prevention By W. Steve Albrecht and Chad O. Albrecht
Felker, M. | 2007
16
Case Study: IT Security Governance -- A Slow Start to a High maturity Level
Bitterli, Peter R. | 2005
16
IT Audit Career Development Plan
Gallegos, F. | 2003
16
IT Audit Basics - Auditing General and Application Controls
Sayana, S.Anantha | 2002
16
Book Reviews - Investigating Computer-Related Crime - Also reviewed by Sarathy Emani, CISA, this book is described as being tailored specifically for corporate information systems professionals and investigators and offers a step-by-step approach to understanding and investigating security problems
Emani, Sarathy | 2000
16
Book Review: Fraud Examination & Prevention
Albrecht, W.Steve / Albrecht, Chad O. / Felker, Mikhael | 2007
16
Investigating Computer-Related Crime
Emani, S. | 2000
16
Auditing General and Application Controls
Sayana, S. A. | 2002
16
IT Audit Basics - IT Audit Career Development Plan
Gallegos, Frederick | 2003
17
Assessing the European IT Governance Climate
Poole, V. | 2001
17
IT Audit Basics: What Every IT Auditor Should Know About Cyberforensics
Singleton, Tommie W. | 2006
17
Book Review: Making IT Governance Work in a Sarbanes-Oxley World By Jaap Bloem, Menno Van Doorn and Piyush Mittal
de la Fuente, R. J. | 2006
17
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances noted.
| 2001
17
Book Review: IT Risk: Turning Business Threats Into Competitive Advantage
de la Fuente, Reynaldo J. | 2008
17
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
17
Book Reviews - Review of ISACF publication: Control Objectives for Net Centric Technology - Peter Hill, CISA succinctly, yet thoroughly, describes what the potential readers of this four-volume set can expect and how the information imparted will help them in their profession
Hill, Peter | 2000
17
IT Governance: New Players, Challenges and Opportunities
Johnson, Everett C. | 2005
17
IT Governance - IT Governance Putting It in Perspective - Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward.
| 2001
17
Perspective - How to Audit Customer Relationship Management (CRM) Implementations - While acknowledging the importance of CRM technology, the author discusses the importance of evaluating CRM implementations, arguing that not all attempts at CRM are successful. She provides a list of steps to conduct a straightforward audit of CRM implementations.
Balcazar, Priscila | 2001
17
Commentary - The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act
Alles, Michael / Kogan, Alexander / Vasarhelyi, Miklos | 2004
17
IT Governance - IT Governance and Outsourcing
Parkes, Hugh | 2004
17
Global Perspectives: IT Governance
Fonseca, Dante Ferrini / Mustafa, Erol | 2006
17
IT Value: Five Steps to Introducing Val IT: Applying Val IT to Introduce or Improve Value Management in an Enterprise
Harries, Sarah / Harrison, Peter | 2008
17
IT Governance - "To Be, or Not To Be" -- The Question of Runaway Projects
Sarup, Deepak | 2003
17
"To Be, or Not To Be"-The Question of Runaway Projects
Sarup, D. | 2003
17
IT Governance: Bridging Business and IT Strategies With Enterprise Architecture: Realising the Real Value of Business-IT Alignment
Chatterji, Sushil | 2007
17
IT Audit Basics: What Every IT Auditor Should Know About Project Risk Management
Singleton, Tommie W. | 2006
17
IT Governance Putting It in Perspective Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward
| 2001
17
IT Governance - The IT Dimension of Basel II
Guldentops, Erik | 2004
17
Surfing @ the Razor's Edge: Governance and Managing Change
Sarup, D. | 2002
17
IT Governance: The Role of the IT Auditor in IT Governance
Hardy, G. | 2009
17
How to Audit Customer Relationship Management (CRM) Implementations While acknowledging the importance of CRM technology, the author discusses the importance of evaluating CRM implementations, arguing that not all attempts at CRM are successful. She provides a list of steps to conduct a straightforward audit of CRM implementations
Balcazar, P. | 2001
17
Global Perspectives: IT Audit Education
Rosenthal-Sabroux, Camille / Merhout, Jeffrey W. / Best, Peter J. | 2006
17
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act
Alles, M. / Kogan, A. / Vasarhelyi, M. | 2004
17
Effective Information Technology Governance Will Improve Returns to Shareholders
Dodds, R. | 2004
17
IT Governance: IT and Enterprise Governance
Parkinson, Michael J.A. / Baker, Nicholas J. | 2005
17
IT Governance - Effective Information Technology Governance Will Improve Returns to Shareholders
Dodds, Rupert | 2004
17
Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
17
Review of ISACF publication: Control Objectives for Net Centric Technology
Hill, P. | 2000
17
IT Audit Basics - The Audit Report and Follow-up: Methods and Techniques for Communicating Audit Findings and Recommendations - Fred Gallegos, CISA, CGFM, CDE, discusses the audit report, the key deliverable for the audit. He breaks down the methods and techniques for assessing the audit as well as the auditor and for communicating audit findings and recommendations.
Gallegos, Fred | 2002
17
The IT Dimension of Basel II
Guldentops, E. | 2004
17
IT Governance: A Road Map for Regulatory Compliance
Annaswamy, S. | 2009
17
Fraud Analysis Technique Using ACL
Vazzari, D. | 2010
17
The Audit Report and Follow-up: Methods and Techniques for Communicating Audit Findings and Recommendations
Gallegos, F. | 2002
17
IT and Enterprise Governance
Parkinson, M. J. A. / Baker, N. J. | 2005
17
IT Governance and Outsourcing
Parkes, H. | 2004
17
IT Governance - Surfing (commat) the Razor's Edge: Governance and Managing Change
Sarup, Deepak | 2002
17
IT Governance - Assessing the European IT Governance Climate - Vernon Poole reports on the status of IT governance in Europe in the wake of increasing security attacks and the adoption of BS 7799 as an ISO standard in September 2000.
Poole, Vernon | 2001
18
Information Technology Control & Audit
| 2000
18
IT Value: IT Project Cancellations: Pay Now or Pay Later
Thorp, John | 2008
18
IT Value: Practical Guidance on Establishing the Val IT Value Governance Process
Harries, Sarah / Harrison, Peter | 2008
18
IT Value: Recognising the Need for Val IT: Identifying Tipping Points for Value Management
Harries, Sarah / Harrison, Peter | 2008
18
R&D Collaboration: The Process, Risks and Checkpoints
Finne, Thomas | 2003
18
IT Governance: Linking Business Goals to IT Goals and COBIT Processes
Grembergen, Wim Van / Haes, Steven De / Moons, Jan | 2005
18
The Role of the Auditor in IT Governance
Woda, A. | 2002
18
Businesses Today Are Undergoing a Chemical Change
Lainhart, J. W. | 2001
18
Book Reviews - Information Technology Control & Audit - Reprinted by permission from EDPAC's
| 2000
18
Security Monitoring
Gumus, T. | 2010
18
IT Governance: Using COBIT for IT Control Health Check-up
Rafeq, A. | 2005
18
PLUS - Technical Q & A, Helpsource
Lilly, Fred L. | 2000
18
IT Audit Basics - The Necessity for Documentation - S. Anantha Sayana, CISA, CIA, discusses the importance of IS auditors' work and observations in the course of an audit.
Sayana, S.Anantha | 2002
18
IT Governance - The Role of the Auditor in IT Governance - Alex Woda discusses the importance, now more than ever, of the auditor's involvement in supporting and helping implement corporate governance in IT and management.
Woda, Alex | 2002
18
Performing a Security Risk Assessment
Schmittling, R. / Munns, A. | 2010
18
IT Governance - Businesses Today Are Undergoing a Chemical Change - John W Lainhart IV, CISA, reports on the changes impacting businesses today in the wake of the e-commerce revolution and points out the need for IT governance to keep control over the enterprise's investment.
Lainhart IV, John W. | 2001
18
Global Perspectives: Privacy for the Individual-A Reserve Bank of India Initiative
Chaudhuri, A. P. / Sinha, A. | 2006
18
The Necessity for Documentation
Sayana, S. A. | 2002
19
Computer Aided Fraud Prevention and Detection-A Step-by-step Guide
Kanhere, V. | 2010
19
Commantrary - Security and Regulatory Compliance: A Quantitative Risk Management Approach
Drake, Art / Jeschke, Jerry | 2004
19
Principles of Fraud Examination By Joseph T. Wells
Kanhere, V. | 2006
19
Perspectives - Why Rein in Linux? - Underneath all the hype, sometimes it's hard to answer the question: What is Linux? The author gives a compact explanation of the history and development of Linux, compares and contrasts several versions of it, reviews uses for it, discusses tools for controlling it and relates his own experiences in installing it
Norris Jr, Robert C. | 2000
19
IT Audit Basics - Auditing Governance in ERP Projects
Sayana, S.Anantha | 2004
19
Survivability Strategies for the Next Generation Network
Huang, S. | 2006
19
Global Perspectives
Ong'ondi, Dismas / Stewart-Rattray, Jo / Coe, Martin J. | 2006
19
IT Audit Basics - Auditing Wireless Telecommunications: An Issue of Standards
Gallegos, Frederick | 2004
19
IT Governance: The Rule of Four of IT Governance
Guldentops, Erik | 2007
Feedback