Julbe Moya, 2022 - Google Patents
Information technology audit principles applied to risk assessment in the infrastructure layerJulbe Moya, 2022
View PDF- Document ID
- 10495224691089414146
- Author
- Julbe Moya P
- Publication year
External Links
- 238000005516 engineering process 0 title abstract description 25
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1714327A (en) | Security Maturity Assessment Methodology | |
Julisch et al. | Compliance by design–Bridging the chasm between auditors and IT architects | |
Hintzbergen et al. | Foundations of Information Security Based on ISO27001 and ISO27002 | |
Kohnke et al. | Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Hingarh et al. | Understanding and conducting information systems auditing | |
Cotteleer et al. | Cybersecurity Requirements for AM Systems: New Enforcement in DoD Environments, and Resources for Implementation | |
O’Connor et al. | 2010 economic analysis of role-based access control | |
Julbe Moya | Information technology audit principles applied to risk assessment in the infrastructure layer | |
Smeets et al. | RPA from the Perspective of the Audit | |
Savolainen | Evaluating security and privacy of SaaS service | |
Cissp | Security software development: assessing and managing security risks | |
Goosen | The development of an integrated IT risk assessment questionnaire for internal auditors' use | |
Othman et al. | A Conceptual Framework of Information Security Database Audit and Assessment | |
Loumbas et al. | Data Security Implications in Digital Health:: A Cautionary Tale | |
Go | Analysing the information technology and security risks of Epic: the difference in the risk perception of Epic between the literature and practice | |
Bannink | Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC | |
Al Moteri | Decision support for shared responsibility of cloud security metrics | |
Kabay et al. | Operations Security and Production Controls | |
Hasan | A CONCEPTUAL FRAMEWORK OF INFORMATION SECURITY DATABASE AUDIT AND ASSESSMENT IN UNIVERSITY BASED ORGANIZATION | |
Disi | Auditing Linux systems for a secure enterprise IT environment | |
Sanyal et al. | OrgAccess: A Benchmark for Role Based Access Control in Organization Scale LLMs | |
Shekar | Bitbucket Server to Bitbucket Cloud migration | |
Gallegos et al. | SAP Implementation and Control | |
Anturaniemi | Information Security Plan for SAP HCM |