
The IT Regulatory and Standards Compliance Handbook
How to Survive Information Systems Audit and Assessments
- 750 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The IT Regulatory and Standards Compliance Handbook
How to Survive Information Systems Audit and Assessments
About this book
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.- The ulitmate guide to making an effective security policy and controls that enable monitoring and testing against them- The most comprehensive IT compliance template available, giving detailed information on testing all your IT security, policy and governance requirements- A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement- Both technical staff responsible for securing and auditing information systems and auditors who desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems from this book- This technically based, practical guide to information systems audit and assessment will show how the process can be used to meet myriad compliance issues
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Solutions in this chapter:
Introduction
Does Security Belong within IT?
Management Support
Job Roles and Responsibilities
What Are Audits, Assessments, and Reviews?
Table of contents
- Cover image
- Table of Contents
- Lead Author
- Technical Editors
- Chapter 1. Introduction to IT Compliance
- Chapter 2. Evolution of Information Systems
- Chapter 3. The Information Systems Audit Program
- Chapter 4. Planning
- Chapter 5. Information Gathering
- Chapter 6. Security Policy Overview
- Chapter 7. Policy Issues and Fundamentals
- Chapter 8. Assessing Security Awareness and Knowledge of Policy
- Chapter 9. An Introduction to Network Audit
- Chapter 10. Auditing Cisco Routers and Switches
- Testing the Firewall
- Chapter 12. Auditing and Security with Wireless Technologies
- Chapter 13. Analyzing the Results
- Chapter 14. An Introduction to Systems Auditing
- Chapter 15. Database Auditing
- Chapter 16. Microsoft Windows Security and Audits
- Chapter 17. Auditing UNIX and Linux
- Chapter 18. Auditing Web-Based Applications
- Chapter 19. Other Systems
- Chapter 20. Risk Management, Security Compliance, and Audit Controls
- Chapter 21. Information Systems Legislation
- Chapter 22. Operations Security
- Index