The IT Regulatory and Standards Compliance Handbook:
How to Survive Information Systems Audit and AssessmentsBy
- Craig Wright
This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
CSOs, CIOs, CTOs, IT Auditors, Information Security Practitioners, IT Directors, IT Operations Managers and Administrators, IT Consultants
Paperback, 750 Pages
Published: June 2008
- Chapter 1 - Introduction; Chapter 2 - Evolution of Information Systems; Chapter 3 - The Information Systems Audit Program; Chapter 4 - Planning; Chapter 5 - Information Gathering ; Chapter 6 - Security Policy Overview; Chapter 7 - Policy Issues and fundamentals; Chapter 8 - Assessing Security ; Chapter 9 - An Introduction to Network Audit; Chapter 10 - Audting Cisco Router and Switches; Chapter 11 - Testing the Firewall; Chapter 12 - Auditing and Security with Wireless Technologies; Chapter 13 - Analyzing the Results; Chapter 14 - An Introduction to Systems Auditing; Chapter 15 - Database Auditing; Chapter 16 - Microsoft Windows Security and Audits; Chapter 17 - Auditing UNIX and Linux; Chapter 18 - Auditing Web-Based Applications; Chapter 19 - Other Systems; Chapter 20 - Risk Management, Security Compliance, and Audit Controls; Chapter 21 - Information Systems Legislation; Chapter 22 - Operations Secuirty