<P>Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may co
Securing an IT organization through governance, risk management, and audit
β Scribed by Rainey, James L.; Sigler, Ken E
- Publisher
- CRC Press
- Year
- 2016
- Tongue
- English
- Leaves
- 364
- Series
- Internal audit and IT audit
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Content: Cybersecurity Risk ManagementCybersecurityCybersecurity Risk ManagementManaging ICT Security Risk through Governance, Control, and AuditImplementing Best Practices Using a Single Cybersecurity FrameworkChapter SummaryCase ProjectIntroduction to the Framework for Improving Critical InfrastructureCybersecurityOverview of the FrameworkFramework CoreFramework Implementation TiersFramework ProfileFramework Is Descriptive and Not PrescriptiveStructure of the Book's Presentation of the FrameworkChapter SummaryCase ProjectIdentify FunctionIdentify Function OverviewAsset Management CategoryBusiness Environment CategoryGovernance CategoryRisk Assessment CategoryRisk Management CategoryRisk Management PlanImplementing Risk ManagementRisk Handling StrategiesLinking COBIT to the Identify FunctionChapter SummaryCase ProjectProtect FunctionProtect Function OverviewAccess Control CategoryAwareness and Training CategoryData Security CategoryInformation Protection Processes and Procedures CategoryMaintenanceProtective TechnologyLinking COBIT to the Protect FunctionChapter SummaryCase ProjectDetect FunctionDetect Function OverviewAnomalies and Events CategorySecurity Continuous Monitoring CategoryDetection Processes CategoryChapter SummaryCase ProjectRespond FunctionRespond Function OverviewResponse Planning CategoryCommunications CategoryAnalysis CategoryMitigation CategoryImprovement CategoryChapter SummaryCase ProjectRecover FunctionDistinguishing between Business Continuity and Disaster RecoveryImprovement CategoryCommunications CategoryChapter SummaryCase ProjectThe COBIT FrameworkAssumptionsIT GovernanceFramework ModelPractical Technical Scenarios (PTSs)What Drives COBIT 5Framework PrinciplesOther Governance Frameworks and Best PracticesCase ProjectDecomposition of FrameworkFramework Principles: CreationDefinition of Categories and Seven EnablersControl IssueNavigation IssueCase ProjectFramework Structure's Generic DomainsCOBIT's Framework StructurePlanning and OrganizationAcquisition and ImplementationDelivery and SupportMonitoringCase ProjectDecomposition of COBIT 5Purpose of COBIT Control Objectives and PrinciplesPrinciple 1: Installing the Integrated IT Architectural FrameworkPrinciple 2: What Do Stakeholders Value?Principle 3: The Business Context FocusPrinciple 4: Managing RiskPrinciple 5: Measuring PerformanceCase ProjectCOBIT Management GuidelinesEnterprise ManagementRisk ManagementStatus of IT SystemsContinuous ImprovementCase ProjectCOBIT Management DashboardPerformance MeasurementIT Control ProfilingAwarenessBenchmarkingCase ProjectWhat COBIT Sets Out to AccomplishAdaptability to Existing FrameworksConstituency of Governance for FinanceConstituency of Governance for ITCase ProjectInternal AuditsPurpose of Internal AuditsRoles That Potentially Use COBITApproaches to Using COBIT in an Internal AuditTypes of Audits Which Can Be Facilitated Using COBITAdvantages of Using COBIT in Internal AuditsCase ProjectTying It All TogetherCOBIT Works with Sarbanes-Oxley (SOx)COBIT Works with GETITProcess Assessment Model (PAM)Case ProjectReferences
β¦ Subjects
Information technology -- Management. BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior
π SIMILAR VOLUMES
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security
<p>This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. Β Information security is more than configuring firewalls, removingΒ viruses, hacking machines, or setting passwords.
<p><p>This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting password
<p><span>The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises