Assuring Information Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Assuring Information Security by Robert E. Davis, Robert E. Davis
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Robert E. Davis ISBN: 9781476419060
Publisher: Robert E. Davis Publication: June 30, 2012
Imprint: Smashwords Edition Language: English
Author: Robert E. Davis
ISBN: 9781476419060
Publisher: Robert E. Davis
Publication: June 30, 2012
Imprint: Smashwords Edition
Language: English

Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occurring can be clearly seen in the explosion of linked IT infrastructures connected to cloud computing service providers and mobile computing devices. Consequently, the impact of such decentralization has increased the need for effective safeguarding of information assets.

Foundationally paraphrasing from Title 44, Chapter 35, Subchapter III, Section 3542(b)(1) of the United States Code; the term “information security” is defined as the protecting of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Correspondingly, as suggested in Chapter 1 of IT Auditing: Assuring Information Assets Protection, information security is typically a complex and dynamic safeguarding subject. Given the descriptive attributes normally associated with information security, IT auditors usually have a vast array of sub-topics to contemplate when performing information assets protection (IAP) related audits, reviews, or agreed-upon procedures.

“Assuring Information Security” was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of effective information security controls. As for content; Audit Managers, Chief Security Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Technology professionals, and Control Self-Assessment personnel will find this pocket guide an informative, and authoritative, information security document.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occurring can be clearly seen in the explosion of linked IT infrastructures connected to cloud computing service providers and mobile computing devices. Consequently, the impact of such decentralization has increased the need for effective safeguarding of information assets.

Foundationally paraphrasing from Title 44, Chapter 35, Subchapter III, Section 3542(b)(1) of the United States Code; the term “information security” is defined as the protecting of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Correspondingly, as suggested in Chapter 1 of IT Auditing: Assuring Information Assets Protection, information security is typically a complex and dynamic safeguarding subject. Given the descriptive attributes normally associated with information security, IT auditors usually have a vast array of sub-topics to contemplate when performing information assets protection (IAP) related audits, reviews, or agreed-upon procedures.

“Assuring Information Security” was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of effective information security controls. As for content; Audit Managers, Chief Security Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Technology professionals, and Control Self-Assessment personnel will find this pocket guide an informative, and authoritative, information security document.

More books from Application Software

Cover of the book Latent Variable Analysis and Signal Separation by Robert E. Davis
Cover of the book 嗯!Office 2013我也會-超實用的活動DMX財會營收X銷售分析X互動影音X雲端協同範例即上手 by Robert E. Davis
Cover of the book Fundamentals of Assurance for Lean Projects by Robert E. Davis
Cover of the book Digital Dice by Robert E. Davis
Cover of the book Constructive Side-Channel Analysis and Secure Design by Robert E. Davis
Cover of the book Cyber Security Cryptography and Machine Learning by Robert E. Davis
Cover of the book PowerCLI Essentials by Robert E. Davis
Cover of the book 鍵盤先生-沒有最懶,只有更懶的200暗黑鍵盤操控力 by Robert E. Davis
Cover of the book Le S.I. démystifié - 2e éd. by Robert E. Davis
Cover of the book Estimation of Uncertainty of Wind Energy Predictions by Robert E. Davis
Cover of the book Das Wissen der Wissensgesellschaft zwischen Bedrohung und Innovation by Robert E. Davis
Cover of the book Universos paralelos by Robert E. Davis
Cover of the book How to Plan Projects with Microsoft Project by Robert E. Davis
Cover of the book CCIE Top Success Secrets and Best Practices: CCIE Experts Share The World's Cisco Certified Internetwork Expert Greatest Tips by Robert E. Davis
Cover of the book Control Your ERP Destiny by Robert E. Davis
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy