Assuring Information Security Assuring Information Security

Assuring Information Security

    • ¥3,800
    • ¥3,800

発行者による作品情報

Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occurring can be clearly seen in the explosion of linked IT infrastructures connected to cloud computing service providers and mobile computing devices. Consequently, the impact of such decentralization has increased the need for effective safeguarding of information assets.

Foundationally paraphrasing from Title 44, Chapter 35, Subchapter III, Section 3542(b)(1) of the United States Code; the term "information security" is defined as the protecting of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Correspondingly, as suggested in Chapter 1 of IT Auditing: Assuring Information Assets Protection, information security is typically a complex and dynamic safeguarding subject. Given the descriptive attributes normally associated with information security, IT auditors usually have a vast array of sub-topics to contemplate when performing information assets protection (IAP) related audits, reviews, or agreed-upon procedures.

"Assuring Information Security" was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of effective information security controls. As for content; Audit Managers, Chief Security Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Technology professionals, and Control Self-Assessment personnel will find this pocket guide an informative, and authoritative, information security document.

ジャンル
コンピュータ/インターネット
発売日
2012年
6月30日
言語
EN
英語
ページ数
63
ページ
発行者
Robert E. Davis
販売元
Draft2Digital, LLC
サイズ
437.5
KB
ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard
2022年
IT Auditing: Assuring Information Assets Protection IT Auditing: Assuring Information Assets Protection
2012年
GDPR and Cyber Security for Business Information Systems GDPR and Cyber Security for Business Information Systems
2022年
IT Governance IT Governance
2019年
Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition
2014年
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
2020年
Information Systems Auditing: The IS Audit Planning Process Information Systems Auditing: The IS Audit Planning Process
2011年
Auditing Information and Cyber Security Governance Auditing Information and Cyber Security Governance
2021年
IT Auditing: Assuring Information Assets Protection IT Auditing: Assuring Information Assets Protection
2012年
Information Systems Auditing: The IS Audit Follow-up Process Information Systems Auditing: The IS Audit Follow-up Process
2011年
IT Auditing: An Adaptive Process IT Auditing: An Adaptive Process
2011年
Assuring IT Governance Assuring IT Governance
2011年