Introduction to Forensic Computing (English)
- New search for: Curtin, C.Matthew
- New search for: Curtin, C.Matthew
In:
Information systems control journal
;
3
; 47-51
;
2006
-
ISSN:
- Article (Journal) / Print
-
Title:Introduction to Forensic Computing
-
Contributors:Curtin, C.Matthew ( author )
-
Published in:Information systems control journal ; 3 ; 47-51
-
Publisher:
- New search for: ISACA, Serving IT Governance Professionals
-
Place of publication:Rolling Meadows, Ill.
-
Publication date:2006
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.64 / 54.64
- Further information on Basic classification
-
Classification:
-
Source:
Table of contents – Volume 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Who Pays for Security?Ross, Steven J et al. | 2011
- 3
-
Information Security Matters: Cyberrecovery PreparationRoss, Steven J et al. | 2014
- 4
-
IS Security Matters: Recovery in the CloudRoss, Steven J et al. | 2010
- 4
-
Information Security Matters: This Should Not Be HappeningRoss, Steven J et al. | 2012
- 4
-
Information Security Matters: Barbarians at the RampartsRoss, Steven J et al. | 2013
- 5
-
Guest Editorial: Mobility Changes (Almost) Everything!Boni, William C. et al. | 2008
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2006
- 5
-
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.? Excerpted and reprinted from - The EDP Auditor Journal, volume III, 1986| 2009
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the issue of privacy and government intervention, technology and central banking and the new US Independence Rules. He also notes the importance of future donations to the foundation.Cangemi, Michael et al. | 2001
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, presents the annually popular AICPA Top Technology PrioritiesCangemi, Michael P. et al. | 2000
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA discusses corporate governance and lessons learned in regard to Enron. He also discusses the role of corporate governance in preventing cybercrime.Cangemi, Michael et al. | 2002
- 5
-
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.?| 2009
- 6
-
IT Audit Basics: Understanding and Applying Benford's LawSingleton, Tommie W et al. | 2011
- 6
-
IT Audit Basics: IT Audits of Cloud and SaaSSingleton, Tommie W et al. | 2010
- 6
-
Cloud Computing: The Arrival (Finally) of PCI Cloud GuidanceHay, Andrew et al. | 2013
- 6
-
Guest Editorial: Building Bridges: IT as an Enabler of GRC ConvergenceAnand, Sanjay et al. | 2009
- 6
-
The NetworkAmato, Rosemary M et al. | 2014
- 6
-
Cloud Computing: Cloud Computing as an Integral Part of a Modern IT StrategyRuhse, Kai-Uwe et al. | 2012
- 8
-
IS Security Matters: Paris Hilton's PrivacyRoss, Steven J. et al. | 2005
- 8
-
Identifier ManagementRoss, S. J. et al. | 2003
- 8
-
IS Security Matters - Identifier ManagementRoss, Steven J. et al. | 2003
- 8
-
Paris Hilton's PrivacyRoss, S. J. et al. | 2005
- 9
-
the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investmentRoss, S. J. et al. | 2002
- 9
-
IS Security Matters - ROSI Scenarios - Steven J. Ross, CISA, discusses the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investment.Ross, Steven J. et al. | 2002
- 9
-
Book Review - Strategies for Information Technology GovernanceTsang-Reveche, Christina et al. | 2004
- 9
-
IS Security Matters: Gang Aft AgleyRoss, Steven J. et al. | 2009
- 9
-
IT Security Matters: Mail Call IIIRoss, Steven J. et al. | 2007
- 9
-
Strategies for Information Technology GovernanceTsang-Reveche, C. et al. | 2004
- 9
-
Mahogany Row Mail Call While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing| 2001
- 9
-
IS Security Matters - Steve Ross, CISA, approaches DDoS from the prevention of the outages in the first place. To illustrate his points, he sets forth conceptual specifications for this architectureRoss, Steve et al. | 2000
- 9
-
IS Security Matters - Mahogany Row Mail Call - While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing.Ross, Steven J. et al. | 2001
- 9
-
IS Security Matters: Falling Off the TruckRoss, Steven J. et al. | 2006
- 9
-
IS Security Matters: Resilience TransformationRoss, Steven J. et al. | 2008
- 9
-
Cloud Computing: Securing an Evolving Cloud EnvironmentNeely, Matthew et al. | 2014
- 9
-
Five Questions With...Kumar, Charan et al. | 2010
- 10
-
Information Ethics: Policy VacuumsRaval, Vasant et al. | 2012
- 10
-
IS Audit Basics: Auditing the IT AuditorsSingleton, Tommie et al. | 2013
- 11
-
IT Audit Basics: Auditing Realization of Benefits from ITSayana, S.Anantha et al. | 2005
- 11
-
IT Audit Basics: Beyond the IT in IT AuditSingleton, Tommie et al. | 2008
- 11
-
The Ramifications of Sarbanes-OxleySingleton, T. et al. | 2003
- 11
-
Network Security: The Complete ReferenceParmar, K. et al. | 2004
- 11
-
Auditing Realization of Benefits from ITSayana, S. A. et al. | 2005
- 11
-
Book Review - Network Security: The Complete ReferenceParmar, Kamal et al. | 2004
- 11
-
Commentary - The Ramifications of Sarbanes-OxleySingleton, Tommie et al. | 2003
- 12
-
Every Silver Cloud Has a Dark Lining: A Primer on Cloud Computing, Regulatory and Data Security RiskCadregari, Carl et al. | 2011
- 12
-
Information Ethics: ISACA's Corporate Social ResponsibilityRaval, Vasant et al. | 2014
- 12
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for ISACATM membership and the CISAa designation are outlined and the status of ISACA issuances noted.| 2002
- 12
-
IT Audit Basics: Auditing Applications, Part 1Singleton, Tommie W et al. | 2012
- 12
-
Numerous Opinions — Which Will Happen? A Review of 2010 IT Trends and Predictions| 2010
- 13
-
Standards, Statements, Guideliness - Standard, and guidelines for maintaining compliance for both ISACA" membership and the CISAe designation are outlined and the status of ISACA issuances noted.| 2001
- 13
-
IS Security Matters - Modeling ResiliencyRoss, Steven J. et al. | 2004
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About Controls: The CDLCSingleton, Tommie W. et al. | 2009
- 13
-
Global Perspectives: The View of and Approach Toward CybercrimeCilli, Claudio et al. | 2006
- 13
-
IT Audit Basics: IT Audit Education and Professional DevelopmentSingleton, Tommie et al. | 2007
- 13
-
COBIT Advisor 2nd Edition| 2000
- 13
-
Book Reviews - COBIT Advisor 2nd Edition - Although there are two book reviews by two different authors for this book, the editors believed both to be of value. One focuses on what a person needs to know about COBIT to use COBIT Advisor. The other review walks the reader through practical applications of COBIT Advisor in one's work world| 2000
- 13
-
Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA^o designation are outlined and the status of ISACA issuances noted| 2001
- 13
-
Modeling ResiliencyRoss, S. J. et al. | 2004
- 14
-
IT Governance: IT Governance Global Status Report 2008: An ExcerptSteuperaert, Dirk et al. | 2008
- 14
-
Make Sure Management and IT Are on the Same Page: Implementing an IT Governance FrameworkHardy, G. et al. | 2002
- 14
-
IT Governance - Make Sure Management and IT Are on the Same Page: Implementing an IT Governance Framework - Gary Hardy examines the management of IT through an IT governance framework. To govern IT effectively, it is important to appreciate the activities and risks within IT that need to be managed. Using the CoBiT Framework's four domains and the IT processes, he breaks this down -- Looking at it logically from a top management perspective.Hardy, Gary et al. | 2002
- 15
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2005
- 15
-
IT Value: Five Critical Success Factors for Introducing Val ITHarries, Sarah et al. | 2009
- 15
-
Information Ethics: Why Do Corporate Frauds Occur?Raval, Vasant et al. | 2013
- 15
-
Plus - HelpSource Q & ALilly, Fred L. et al. | 2001
- 16
-
IS Audit Basics: The Logical Reason for Consideration of ITSingleton, Tommie et al. | 2014
- 17
-
Book Review: Security, Audit and Control Features Oracle® Database, 3rd EditionMookhey, K K et al. | 2010
- 17
-
IT Audit Basics: What Every IT Auditor Should Know About CyberforensicsSingleton, Tommie W. et al. | 2006
- 17
-
IT Governance - IT Governance Putting It in Perspective - Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward.| 2001
- 17
-
IT Governance - Effective Information Technology Governance Will Improve Returns to ShareholdersDodds, Rupert et al. | 2004
- 17
-
IT Governance Putting It in Perspective Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward| 2001
- 17
-
IT Governance: IT and Enterprise GovernanceParkinson, Michael J.A. et al. | 2005
- 17
-
IT Governance: Bridging Business and IT Strategies With Enterprise Architecture: Realising the Real Value of Business-IT AlignmentChatterji, Sushil et al. | 2007
- 17
-
Effective Information Technology Governance Will Improve Returns to ShareholdersDodds, R. et al. | 2004
- 17
-
Questions That Must Be Addressed for a Successful IFRS ImplementationBrown, William C et al. | 2011
- 17
-
IT and Enterprise GovernanceParkinson, M. J. A. / Baker, N. J. et al. | 2005
- 18
-
IT Value: Recognising the Need for Val IT: Identifying Tipping Points for Value ManagementHarries, Sarah et al. | 2008
- 18
-
Business Skills for the IT Audit and Assurance ProfessionalParker, Robert G et al. | 2010
- 18
-
Information Technology Control & Audit| 2000
- 18
-
The Necessity for DocumentationSayana, S. A. et al. | 2002
- 18
-
Book Reviews - Information Technology Control & Audit - Reprinted by permission from EDPAC's| 2000
- 18
-
IT Audit Basics - The Necessity for Documentation - S. Anantha Sayana, CISA, CIA, discusses the importance of IS auditors' work and observations in the course of an audit.Sayana, S.Anantha et al. | 2002
- 19
-
Book Review: Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crime, 2nd EditionRafeq, A. et al. | 2009
- 19
-
Auditing Wireless Telecommunications: An Issue of StandardsGallegos, F. et al. | 2004
- 19
-
Auditing OS and Database ControlsSayana, S. A. et al. | 2003
- 19
-
IT Audit Basics - Auditing Wireless Telecommunications: An Issue of StandardsGallegos, Frederick et al. | 2004
- 19
-
Big Data — Not a PanaceaRiffat, Muzamil et al. | 2014
- 19
-
SOC Progress ReportVazzana, Brian et al. | 2012
- 19
-
IT Audit Basics - Auditing OS and Database ControlsSayana, S.Anantha et al. | 2003
- 20
-
IT value: Program Management: Seeing Both the Forest and the TreesThorp, John et al. | 2007
- 20
-
Book Review: Official Certified Ethical Hacker Review Guide, Version 7.1Sule, Dauda et al. | 2013
- 20
-
Standards, Statements, Guidelines ISACA® Member and Certification Holder Compliance| 2009
- 20
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 21
-
IT Governance: Moving From IT Governance to Enterprise Governance of ITDe Haes, Steven et al. | 2009
- 21
-
Migrating From COBIT 4.1 to COBIT 5 — Upgrading the Turkish Banking SystemKazmirci, Kaya et al. | 2013
- 22
-
Big Data Analytics for Sophisticated Attack DetectionVirvilis, Nikos et al. | 2014
- 22
-
ISACA® Member and Certification Holder Compliance| 2004
- 22
-
IT Governance: Why a Guideline?Cilli, C. et al. | 2003
- 22
-
IT Governance - IT Governance: Why a Guideline?Cilli, Claudio et al. | 2003
- 22
-
Global Perspectives: The Changing Role of the IT AuditorMansour, Charles et al. | 2005
- 23
-
Partnership for Critical Infrastructure SecurityLainhart, J. W. et al. | 2000
- 23
-
Features - Virtual Private Networking: Confidentiality on Public Networks - As workplaces become increasingly remote-bascd, enterprises need to identify possible solutions to provide the desired confidentiality, availability and public network connectivity. The concept of a virtual private networking is to create a private network over the public network, or the Internet, by using encryption, authentication and tunneling to allow data to travel securely.Norris Jr, Robert C. et al. | 2001
- 23
-
Virtual Private Networking: Confidentiality on Public Networks As workplaces become increasingly remote-based, enterprises need to identify possible solutions to provide the desired confidentiality, availability and public network connectivity. The concept of a virtual private networking is to create a private network over the public network, or the Internet, by using encryption, authentication and tunneling to allow data to travel securelyNorris, R. C. et al. | 2001
- 23
-
IT Governance: Information Security GovernanceMalik, William J. et al. | 2006
- 23
-
An E-citadel for Securing Credit Card and Consumer Data: A New Application for an Old Approach to SecurityArnold, T. et al. | 2002
- 23
-
Security, Audit and Control Issues for Managing Risk in the Wireless LAN EnvironmentStanley, Richard A. et al. | 2004
- 23
-
Perspective - Partnership for Critical Infrastructure Security - Critical infrastructure, the backbone of the American economy, faces insidious and potentially destructive threats such as cyber strikes and acts of violence. Learn what ISACA's role is in addressing these problemsLainhart IV, John W. et al. | 2000
- 23
-
A Primer on Nonrelational, Distributed Databases for IS ProfessionalsMarkey, Steve et al. | 2012
- 23
-
What Is Big Data and What Does It Have to Do With IT Audit?Setty, Kumar et al. | 2013
- 23
-
An E-citadel for Securing Credit Card and Consumer Data: A New Application for an Old Approach to Security - Businesses suffer threats to security from different types of attacks. Unfortunately, many of today's e-businesses implement security programs that bear far more resemblance to an eggshell than a citadel. The author outlines 10 suggestions that can help an organization change its security model from an easily cracked eggshell to a more advanced, defensive model.Arnold, Tom et al. | 2002
- 24
-
Cybersecurity and the Critical Infrastructure: Looking Beyond the PerimeterAxelrod, C.Warren et al. | 2006
- 24
-
Book Review: Stepping Through the InfoSec ProgramAxelrod, C.Warren et al. | 2008
- 24
-
Crossword PuzzleMellor, Myles et al. | 2009
- 25
-
Book Review: Information Development: Managing Your Documentation Projects, Portfolio, and PeopleChatterjee, Soumen et al. | 2008
- 25
-
Is Your Business Continuity Plan a Paper Tiger?Kothari, Priyank et al. | 2007
- 25
-
Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program - Computer forensics is the collection, preservation, analysis and court presentation of computer-related evidence. The proper collection and analysis of computer evidence through accepted computer forensic protocols is a critical component to any internal investigation or audit where the results have at least the potential to be presented in a legal proceeding.Barbin, Douglas et al. | 2002
- 25
-
Book Reviews: From Business Strategy to IT Action By Robert J. Benson, Thomas L. Bugnitz and William B. WaltonTsang-Reveche, C. et al. | 2005
- 25
-
Book Reviews - From Business Strategy to IT ActionBenson, Robert J. et al. | 2005
- 25
-
Excerpt: IT Governance Roundtable: Brisbane September 2008| 2009
- 25
-
Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance ProgramBarbin, D. / Patzakis, J. et al. | 2002
- 25
-
Automated Audit Testing for SAP Data — Benefit or Just Another Black Box?Wenig, Stefan et al. | 2011
- 25
-
Book Reviews - Integrated Auditing of ERP SystemsMusaji, Yusufali F. et al. | 2005
- 26
-
Case Study - The COBIT Maturity Model in a Vendor Evaluation CasePederiva, Andrea et al. | 2003
- 26
-
Building Your Bridge to the FutureReed, James et al. | 2010
- 26
-
The COBIT® Maturity Model in a Vendor Evaluation CasePederiva, A. et al. | 2003
- 26
-
IT Governance Roundtables Spur DiscussionPoole, V. et al. | 2000
- 26
-
Perspective - IT Governance Roundtables Spur Discussion - This article summarizes the lively and productive discussions that occurred in the UK. The article is sponsored by the IT Governance Institute and is written by an ISACA member who attended the first IT Governance ForumPoole, Vernon et al. | 2000
- 26
-
Considerations for Ensuring Security of Research Data in a Federally Regulated EnvironmentMedina, Jacqueline et al. | 2013
- 27
-
Data Privacy and Big Data — Compliance Issues and ConsiderationsEmmanuel Yu, William et al. | 2014
- 27
-
Securing the Wireless NetworkNelson, William F. et al. | 2004
- 27
-
A Prelude to IT Assurance FrameworkMuthukrishnan, Ravi et al. | 2008
- 27
-
IT Risk Exploration: The IT Risk Management Taxonomy and EvolutionSchlarman, Steve et al. | 2009
- 27
-
Communication — The Missing PieceGoldberg, Danny M et al. | 2012
- 28
-
Data Hiding - This article examines techniques that a slightly more sophisticated end user might employ to hide data rather than trying to erase them, including renaming files, changing file extensions, turning on the hidden attribute function and concealing information in a part of the disk where data would not normally exist.Hoskinson, Clayton et al. | 2002
- 28
-
IT Does Not Matter...Or, Does IT? Has IT Moved From a Strategic to a Purely Tactical Function?Sarup, Deepak et al. | 2005
- 28
-
Control Considerations in Object-oriented SystemsCobb, Andrew T. et al. | 2007
- 28
-
examines techniques that a slightly more sophisticated end user might employ to hide data rather than trying to erase them, including renaming files, changing file extensions, turning on the hidden attribute function and concealing information in a part of the disk where data would not normally existHoskinson, C. / Sleezer, J. et al. | 2002
- 29
-
Critical Elements of Information Security Program SuccessO'Bryan, Sharon K. et al. | 2006
- 29
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 29
-
Features - Top US Privacy Stories of 2000 - The phenomenal rise and technological sophistication of workplace surveillance leads the list of the Top 10 US privacy stories of the year 2000, according to a Privacy Foundation analysis.Keating, Stephen et al. | 2001
- 29
-
Top US Privacy Stories of 2000 The phenomenal rise and technological sophistication of workplace surveillance leads the list of the Top 10 US privacy stories of the year 2000, according to a Privacy Foundation analysisKeating, S. / Smith, R. M. et al. | 2001
- 30
-
Implementing COBIT in New South Wales HealthTyler, R. et al. | 2000
- 30
-
Case Study - Implementing COBIT in New South Wales Health - Using a model called the Systems Audit Life Cycle, the health institution developed six internal audits for a large systems implementation process. Healthcare executives advocate planning the use Of COBIT as they would any other large project. This article gives the specificsTyler, Ross et al. | 2000
- 30
-
Case Study - IT Security Awareness ProgrammeWiederkehr, Bruno et al. | 2003
- 30
-
What Auditors Should Know About EncryptionChan, David et al. | 2004
- 30
-
IT Security Awareness ProgrammeWiederkehr, B. et al. | 2003
- 31
-
Using CoBIT 4.1 to Guide the Adoption and Implementation of Open Source SoftwareHaes, Steven De et al. | 2008
- 31
-
Excerpt: ITGI Enables ISO-IEC 38500:2008 AdoptionHardy, Gary et al. | 2009
- 31
-
Information Security Career Planning: Education, Training and the Role of Professional CertificationsNewman, Kenneth et al. | 2010
- 31
-
Adopting Continuous Auditing/Continuous Monitoring in Internal AuditVasarhelyi, Miklos A et al. | 2012
- 31
-
The Assimilation of Marketing's Service Quality Principles and the IT Auditing Process: A Move Toward Quantifiable SAS 70 Auditing Service Quality, Part 1Bell III, Thomas J et al. | 2011
- 32
-
The Asian Tsunami: A Wake-up Call for Traditional Disaster Recovery PlanningBakshi, Sunil et al. | 2005
- 32
-
Selecting the Right Cloud Operating ModelSchaefer, Thomas et al. | 2014
- 33
-
Choosing the Best Solution for Your Network Security: Secure Shell, TLS or IPSec The increase in computer security breaches has fostered the publics awareness of the critical need for data security to continue the successful growth of a business. The author discusses possible solutions, including Secure Shell, Transport Layer Security and Internet Protocol SecurityCarasik, A. et al. | 2001
- 33
-
Providing Continuous Audit to Oracle ApplicationsNelson, M. L. et al. | 2000
- 33
-
Features - Choosing the Best Solution for Your Network Security: Secure Shell, TLS or IPSec - The increase in computer security breaches has fostered the public s awareness of the critical need for data security to continue the successful growth of a business. The author discusses possible solutions, including Secure Shell, Transport Layer Security and Internet Protocol Security.Carasik, Anne et al. | 2001
- 33
-
The Val IT™ StoryThorp, J. et al. | 2006
- 33
-
The Val ITTM StoryThorp, John et al. | 2006
- 33
-
Practical Pointers - Providing Continuous Audit to Oracle Applications - For anyone who has ever done it, documentation and change tracking of Oracle Applications Setup Values are challenging, manual-labor-intensive tasks. Even though this is so, ERP software packages are designed so that customers can tailor the software, often through complex setup steps. The author explains how, when and why Tickmark Setup Reporter works, shaving hours and even days off an auditor's jobNelson, Mark L. et al. | 2000
- 34
-
IT Security Responsibilities Change When Moving to the CloudWlosinski, Larry G et al. | 2013
- 34
-
Case Study - A Selective Approach to COBIT: A Top-down ApproachOliver, Derek J. et al. | 2003
- 34
-
Avoiding Tainted TestimonySterneckert, A. B. et al. | 2002
- 34
-
A Selective Approach to COBIT: A Top-down ApproachOliver, D. J. et al. | 2003
- 34
-
Avoiding Tainted Testimony - The author provides a sample study of an internal investigation to illustrate the effects testimony and evidence can have on a legal case. Business and government professionals frequently do not comprehend how their words and actions impact their ability to deliver credible witness testimony.Sterneckert, Alan B. et al. | 2002
- 34
-
Analyzing the Security of Internet Banking Authentication MechanismsDimitriadis, Christos K. et al. | 2007
- 34
-
Vendor Due DiligenceBayuk, Jennifer et al. | 2009
- 35
-
The Value to IT of Using International StandardsOud, Ernst Jan et al. | 2005
- 35
-
Audit Careers 2010: The Swing of the PendulumTuck, Richard et al. | 2010
- 36
-
Audit Evidence RefresherKamau, Ookeditse et al. | 2012
- 36
-
Best Practices for Wireless Network SecurityKennedy, Susan et al. | 2004
- 36
-
A New Approach for Assessing the Maturity of Information SecurityAlAboodi, Saad Saleh et al. | 2006
- 36
-
General Auditing for IT AuditorsGoldberg, Danny M et al. | 2011
- 37
-
Keys to Data Governance Success: Teamwork and an Iterative ApproachMoseley, Marty et al. | 2008
- 37
-
COBIT: A Tool To Manage Information EcologyMartin, Joseph et al. | 2003
- 38
-
Combating Cyberthreats -- Partnership Between Public and Private Entities - The article examines the basic elements of cyberthreats, looks at government initiatives to promote the public-private partnership and discusses key steps organizations can take to prevent, detect and recover from cyberthreats.Lee, Elsa et al. | 2002
- 38
-
Combating Cyberthreats-Partnership Between Public and Private EntitiesLee, E. et al. | 2002
- 38
-
Information Controls and Monitoring Framework for Health Care OrganizationsPatil, Santhosh et al. | 2013
- 39
-
Tone at the Top Is Vital! A Delphi StudyBruinsma, Christine et al. | 2009
- 39
-
Using Wireless Network Audit TechniquesHoesing, Michael T. et al. | 2004
- 39
-
Electronic Documents Information Security ComplianceHamidovic, Haris et al. | 2014
- 40
-
Assessing the Value of IT: Understanding and Measuring the Link Between IT and StrategyBurg, William D. et al. | 2005
- 40
-
Case Study: Auditor Ethics for Continuous Auditing and Continuous MonitoringDaigle, Jill Joseph et al. | 2008
- 40
-
HIPAA Preparation Begins and Y2K EndsLandreth, J. / Ledman, M. C. et al. | 2000
- 40
-
Features - HIPAA Preparation Begins and Y2K Ends - For the first time, there is a governmental mandate on information security requirements. New regulations in the United States regarding the portability and accountability of health insurance will generate significant changes in security policies and procedures, security tools and communications standardsLandreth, John et al. | 2000
- 40
-
IT Auditor Careers: IT Governance Provides New Roles and OpportunitiesGallegos, Frederick et al. | 2003
- 40
-
It's Not Easy Being Green: How the Green IT Movement Is Impacting Careers in IT AuditJuergens, Michael et al. | 2010
- 40
-
Project Portfolio ManagementHeiskanen, Aarni et al. | 2012
- 40
-
Math on Malwarevan der Molen, Henk-Jan et al. | 2011
- 41
-
Features - Creating the Privacy Compilant Organization - The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy compliant, adhering to the specific requirements of the legislation under which it operates.Parker, Robert G. et al. | 2001
- 41
-
Creating the Privacy Complaint Organization The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy complaint, adhering to the specific requirements of the legislation under which it operatesParker, R. G. et al. | 2001
- 42
-
Maximizing Backup and Recovery of Data and SystemsWandrei, Philip L. et al. | 2007
- 42
-
Writing Good Risk StatementsPower, Benjamin et al. | 2014
- 43
-
A Guide to Wireless Network SecurityAshley, Mitchell et al. | 2004
- 43
-
A Holistic Definiton of IT Security -- Part 1Musaji, Yusuf et al. | 2006
- 43
-
The Social Psychology of IT Security Auditing From the Auditee's Vantage Point: Avoiding Cognitive DissonanceBell III, Thomas J et al. | 2010
- 43
-
Multiagent Model for System User Access Rights AuditMoturi, Christopher A et al. | 2013
- 43
-
IT Governance and Process MaturityDebreceny, Roger et al. | 2009
- 43
-
A Holistic Definition of IT Security-Part 1Musaji, Y. et al. | 2006
- 44
-
Principles of GovernanceHamaker, Stacey et al. | 2003
- 44
-
Features - Auditing and Business Controls: Coming of Age in the Healthcare Industry - Meeting changes in the healthcare industry, specifically on the delivery side, requires a broadened, updated concept of internal controls and access to expert resources to do the job. Learn how providing these can add value to organizationsJust, G.Randolph et al. | 2000
- 44
-
Auditing and Business Controls: Coming of Age in the Healthcare IndustryJust, G. R. / Fabrizius, M. P. et al. | 2000
- 45
-
Computer-assisted Audit Techniques: Value of Data Mining for Corporate AuditorsOtt, John et al. | 2008
- 45
-
Audit-focused Mining — New Views on Integrating Process Mining and Internal ControlSchultz, Martin et al. | 2014
- 45
-
Automating ControlsPareek, Mukul et al. | 2007
- 45
-
New Opportunities for Information Systems Auditors: Linking SysTrustSM to COBIT - This is the third in a series of articles linking new types of assurance services suggested by the American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) to COBIT. This article addresses how information system auditors can play a lead role in providing SysTrust assurance services to internal and external constituents.Frownfelter-Lohrke, Cynthia et al. | 2002
- 45
-
New Opportunities for Information Systems Auditors: Linking SysTrust^S^A^I to COBITFrownfelter-Lohrke, C. / Hunton, J. E. et al. | 2002
- 46
-
Features - Erosion of Trust E-commerce and the Loss of Privacy - The author discusses the differences between personal information and sensitive information and the need to build a consumer s trust and confidence. Furthermore, the article addresses the actions taken by various governments and the e-commerce market itself to protect the consumer.Andrews, Jonathan D. et al. | 2001
- 46
-
Haruspex — Simulation-driven Risk Analysis for Complex SystemsBaiardi, Fabrizio et al. | 2012
- 46
-
IT Performance Improvement With COBIT and the SEI CMMMallette, Debra et al. | 2005
- 46
-
Erosion of Trust E-commerce and the Loss of Privacy The author discusses the differences between personal information and sensitive information and the need to build a consumers trust and confidence. Furthermore, the article addresses the actions taken by various governments and the e-commerce market itself to protect the consumerAndrews, J. D. et al. | 2001
- 47
-
An Investigation of Computer ForensicsPidanick, Ryan et al. | 2004
- 47
-
Introduction to Forensic ComputingCurtin, C.Matthew et al. | 2006
- 48
-
IT Risk Analysis — The Missing "A"Brown, Eric J et al. | 2010
- 49
-
The Why and How of Leveraging Synergies Across Sarbanes-Oxley and Other RegulationsAnand, Sanjay et al. | 2007
- 49
-
Pushing Back the Rain — How to Create Trustworthy Services in the CloudBogdanov, Dan et al. | 2013
- 49
-
Features - Defeating the Cyber Criminal: Defense Tactics for Denial of Service Attacks - The letters DDoS are anathema to almost anyone who conducts or offers business on the Internet. The author describes how these attacks could create legal implications for everyone in the chain and describes intrusion detection controls and disaster recovery methods in depthBigler, Mark et al. | 2000
- 49
-
Key Considerations for Business ResiliencyPironti, John P. et al. | 2009
- 49
-
Defeating the Cyber Criminal: Defense Tactics for Denial of Service AttacksBigler, M. et al. | 2000
- 49
-
Pay Today or Pay Later -- Calculating ROI to Justify Information Security and Compliance BudgetsSingh, Jaspreet et al. | 2008
- 50
-
Features - Cross-Border Privacy Impact Assessments: An Introduction - Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment model.Karol, Thomas J. et al. | 2001
- 50
-
The Second Edition of the European Survey on the Economic Value of Information Technology: Inventory of Practices Concerning IT GovernanceLegrenzi, Christophe et al. | 2003
- 50
-
Cross-Border Privacy Impact Assessments: An Introduction Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment modelKarol, T. J. et al. | 2001
- 50
-
Fighting Internal Crime Before It HappensLux, A. G. / Fitiani, S. et al. | 2002
- 50
-
Fighting Internal Crime Before It Happens - Some of the most potentially crippling crimes against an enterprise are committed by the organization's own employees. To wage a battle against an enemy, it is necessary to first identify that enemy.Lux, Allen G. et al. | 2002
- 50
-
Help Source Q&ASubramaniam, Gan et al. | 2011
- 51
-
Refining IT Processes Using COBITReingold, Stephen et al. | 2005
- 51
-
A Business Model for Information SecurityAnderson, Kent et al. | 2008
- 51
-
New Rules Regarding E-discoveryGonzalez, Silka Maria et al. | 2007
- 51
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 2)John Steinbart, Paul et al. | 2014
- 52
-
Key Elements of a Threat and Vulnerability Management ProgramPironti, John P. et al. | 2006
- 52
-
Plus - CPE Quiz #70Oringel, Joey et al. | 2000
- 52
-
Plus - CE Quiz #82, Based on Volume 1, 2002Oringel, Joey et al. | 2002
- 53
-
Help Source - Help Source Q&ASubramaniam, B.Ganapathi et al. | 2004
- 53
-
Influencer Analysis: A Perspective on Reducing Audit RiskDeshmukh, Meera et al. | 2007
- 53
-
After Year One -- Automating IT Controls for Sarbanes-Oxley ComplianceDietrich, Robert J. et al. | 2005
- 53
-
Features - CPO Position Joins Executive Ranks - As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in today s corporate environment.Parkinson, Michael et al. | 2001
- 53
-
CPE Quiz#148 - Based on Volumel, 2013Khan, Kamal et al. | 2013
- 53
-
CPO Position Joins Executive Ranks As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in todays corporate environmentParkinson, M. et al. | 2001
- 53
-
CPE Quiz #142 - Based on Volume 1, 2012 Prepared by Kamal Khan, CISA, CISSP, CITP, MBCS| 2012
- 53
-
Virtual Appliances -- The Evolution of a Gold StandardKavanagh, Ronan et al. | 2008
- 53
-
CPE Quiz #136 - Based on Volume 1, 2011Khan, Kamal et al. | 2011
- 55
-
CPE Quiz #94, based on volume 1, 2004Oringel, Joe et al. | 2004
- 55
-
Standards, Guidelines, Tools and Techniques| 2011
- 56
-
The IS Auditor's Consideration of Irregularities and Illegal ActsNihlett, Peter et al. | 2003
- 57
-
Features - E-commerce and Smart Cards - The author discusses the smart card with a C-SET protocol for online authentication as a solution to online security concerns. With smart cards, it is possible to accomplish a complete authentication process, through the use of a personal identification number known only by the owner.Hector Ganzalez, Marcelo et al. | 2001
- 57
-
CPE Quiz #154 - Based on Volume 1, 2014 — Data Privacy Prepared by Kamal Khan, CISA, CISSP, CITP, MBCS| 2014
- 57
-
E-commerce and Smart Cards The author discusses the smart card with a C-SET protocol for online authentication as a solution to online security concerns. With smart cards, it is possible to accomplish a complete authentication process, through the use of a personal identification number known only by the ownerGonzlez, M. H. et al. | 2001
- 57
-
CPE Quiz #112 - Based on Volume 1, 2007Chan, Sally et al. | 2007
- 57
-
CPE Quiz #130 - Based on Volume 1, 2010Khan, Kamal et al. | 2010
- 59
-
CPE Quiz #118 - Based on Volume 1, 2008Khan, Kamal et al. | 2008
- 59
-
CPE Quiz #106 - Based on Volume 1, 2006Rateq, A. et al. | 2006
- 59
-
CPE Quiz #124 - Based on Volume 1, 2009Khan, Kamal et al. | 2009
- 59
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2010
- 59
-
CPE Quiz #100 - Based on volume 1, 2005Khan, Kamal et al. | 2005
- 60
-
Implementing Enterprise Security: A Case Study (Part 2)Doughty, Ken et al. | 2003
- 62
-
Plus - CE Quiz #76, Based on Volume 1, 2001Oringel, Joey et al. | 2001
- 67
-
CPE Quiz #87, based on volume 6, 2002Oringel, Joe et al. | 2003
-
Plus - ISACA Bookstore Offerings - Supplement| 2000
-
Plus - ISACA Bookstore Price List Supplement| 2002
-
ISACA Bookstore Supplement| 2012
-
ISACA Bookstore Price List Supplement| 2008