[go: up one dir, main page]

Julbe Moya, 2022 - Google Patents

Information technology audit principles applied to risk assessment in the infrastructure layer

Julbe Moya, 2022

View PDF
Document ID
10495224691089414146
Author
Julbe Moya P
Publication year

External Links

Continue reading at core.ac.uk (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN1714327A (en) Security Maturity Assessment Methodology
Julisch et al. Compliance by design–Bridging the chasm between auditors and IT architects
Hintzbergen et al. Foundations of Information Security Based on ISO27001 and ISO27002
Kohnke et al. Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework
Paul Official (ISC) 2 Guide to the CSSLP
Hingarh et al. Understanding and conducting information systems auditing
Cotteleer et al. Cybersecurity Requirements for AM Systems: New Enforcement in DoD Environments, and Resources for Implementation
O’Connor et al. 2010 economic analysis of role-based access control
Julbe Moya Information technology audit principles applied to risk assessment in the infrastructure layer
Smeets et al. RPA from the Perspective of the Audit
Savolainen Evaluating security and privacy of SaaS service
Cissp Security software development: assessing and managing security risks
Goosen The development of an integrated IT risk assessment questionnaire for internal auditors' use
Othman et al. A Conceptual Framework of Information Security Database Audit and Assessment
Loumbas et al. Data Security Implications in Digital Health:: A Cautionary Tale
Go Analysing the information technology and security risks of Epic: the difference in the risk perception of Epic between the literature and practice
Bannink Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC
Al Moteri Decision support for shared responsibility of cloud security metrics
Kabay et al. Operations Security and Production Controls
Hasan A CONCEPTUAL FRAMEWORK OF INFORMATION SECURITY DATABASE AUDIT AND ASSESSMENT IN UNIVERSITY BASED ORGANIZATION
Disi Auditing Linux systems for a secure enterprise IT environment
Sanyal et al. OrgAccess: A Benchmark for Role Based Access Control in Organization Scale LLMs
Shekar Bitbucket Server to Bitbucket Cloud migration
Gallegos et al. SAP Implementation and Control
Anturaniemi Information Security Plan for SAP HCM