Limit search to available items
Book Cover
E-book
Author Banoth, Rajkumar

Title A Comprehensive Guide to Information Security Management and Audit
Published Milton : Taylor & Francis Group, 2022

Copies

Description 1 online resource (194 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Author Bios -- Preface -- Acknowledgments -- Acronyms/Abbreviations -- Chapter 1 Information Security and Management System -- Information Security Overview -- 1.1 The OSI Security Architecture -- 1.2 Information Security -- Security attacks -- Passive attack -- Active attack -- 1.3 Security Services -- Confidentiality -- Authentication -- Integrity -- Non-repudiation -- Access control -- Availability -- 1.4 Security Mechanisms -- Specific security mechanisms -- Pervasive security mechanisms
Model for network security -- Some basic terminologies -- Cryptography -- Cryptanalysis -- Introduction and importance of Information Security and Management System (ISMS) -- Why security management? -- 1.5 The CIA and DAD Triads -- The CIA triad -- The DAD triad -- How are the CIA and DAD triads mutually exclusive? -- How can you relate the CIA triad in your everyday life? -- 1.6 ISMS Purpose and Objectives -- Introduction to information security policies -- Elements of information security policy -- Scope (objective) -- Security policies -- Security policy development -- Phased approach
Security policy contributors -- Security policy audience -- Policy categories -- 1.7 Frameworks -- Policy categories -- Additional regulations and frameworks -- Security management policies -- 1.8 Security Standards -- Security standard example -- 1.9 Standard -- Services -- Initial password and login settings -- Send mail -- 1.10 Security procedures -- Security procedure example -- Apache web server security procedure -- 1.11 Security Guidelines -- Security guideline example -- Password selection guidelines -- Do -- Don't -- Suggestions -- 1.12 Compliance vs. Conformance -- Compliance
Conformance -- Special applications -- Conclusion on compliance and conformance -- Bibliography -- Chapter 2 Audit Planning and Preparation -- Introduction -- 2.1 Reasons for Auditing -- 2.2 Audit Principles -- 2.2.1 Planning -- 2.2.2 Honesty -- 2.2.3 Secrecy -- 2.2.4 Audit evidence -- 2.2.5 Internal control system -- 2.2.6 Skill and competence -- 2.2.7 Work done by others -- 2.2.8 Working papers -- 2.2.9 Legal framework -- 2.2.10 Audit report -- 2.3 Process of Audit Program Management -- 2.3.1 Preparing for an audit -- 2.3.2 Audit process -- 2.4 Audit competence and evaluation methods
2.4.1 Audit of individuals -- 2.4.2 Audit of sole trader's books of accounts -- 2.4.3 Audit of partnership firm -- Important provision of Partnership Act -- 2.4.4 Government audit -- Important features of the government audit -- Objectives -- 2.4.5 Statutory audit -- 2.4.6 Audit of companies -- 2.4.7 Audit of trust -- 2.4.8 Audit of cooperative societies -- 2.4.9 Audit of other institutions -- Cost audit -- Objectives of cost audit -- 2.4.10 Tax audit -- 2.4.11 Balance sheet audit -- Continuous audit -- Annual audit -- 2.4.12 Partial audit -- 2.4.13 Internal audit -- 2.4.14 Management audit
Notes Description based upon print version of record
Objectives of management audit
Subject Confidential business information -- Security measures
Computer networks -- Security measures
Information audits
Form Electronic book
Author Narsimha, Gugulothu
Kranthi Godishala, Aruna
ISBN 9781000721195
1000721191