CYBERSECURITY AUDIT/ASSURANCE

被引:0
|
作者
Svata, Vlasta [1 ]
机构
[1] Univ Econ, Dept Syst Anal, Prague, Czech Republic
关键词
Information security; cybersecurity; cybersecurity controls; assurance core components; assurance layers;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Massive cybersecurity breaches have become almost commonplace and many of us are not just the readers of the news about these attacks, but we have experienced them on our own. The natural reaction of the society and professional organizations is to develop tools helping organizations to face this problem. The consequence of this situation is that there exist the whole set of different regulations, guidelines, programs, norms, etc. and organizations being aware of the cyber risks are not sure where to start, what regulation to be compliant with, what money invest. The article deals with the different types of cyber security audit/assurance in relation to the different layers of the complex cybersecurity control environment.
引用
收藏
页码:351 / 358
页数:8
相关论文
共 50 条
  • [21] Factors associated with security/cybersecurity audit by internal audit function
    Islam, Md. Shariful
    Farah, Nusrat
    Stafford, Thomas F.
    MANAGERIAL AUDITING JOURNAL, 2018, 33 (04) : 377 - 409
  • [22] The Impact of the Type of Cybersecurity Assurance Service and Cybersecurity Incidents on Investor Perceptions and Decisions
    Perols, Rebecca R.
    AUDITING-A JOURNAL OF PRACTICE & THEORY, 2024, 43 (03): : 187 - 202
  • [23] Introduction to Software Cybersecurity, Assurance, and Testing Minitrack
    Burns, Luanne
    Linger, Rick
    Alves-Foss, Jim
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 5012 - 5012
  • [24] Introduction: Enlightened Cybersecurity and Software Assurance Minitrack
    Burns, Luanne
    Linger, Rick
    George, Richard
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4857 - 4857
  • [25] Mission assurance policy and risk management in cybersecurity
    Cam H.
    Mouallem P.
    Environment Systems and Decisions, 2013, 33 (4) : 500 - 507
  • [26] Information assurance and cybersecurity across the IT curriculum (USA)
    Richardson, C
    Hansen, E
    James, SD
    Bidgoli, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2004, : 41 - 45
  • [27] Assurance for CyberSecurity with Assume-Guarantee Reasoning
    Alfageeh, Ali
    Bhattacharyya, Siddhartha
    Perl, Samuel
    Patel, Milankumar
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 653 - 659
  • [28] Assurance services and the audit heritage
    Elliott, RK
    AUDITING-A JOURNAL OF PRACTICE & THEORY, 1998, 17 : 1 - 7
  • [29] QUALITY ASSURANCE AND RADIOLOGIC AUDIT
    PITCHER, EM
    WELLS, PNT
    CURRENT OPINION IN RADIOLOGY, 1992, 4 (03) : 9 - 14
  • [30] On the Need for Combined Assurance in IT Audit
    Cooke, Ian
    ISACA Journal, 2022, 1 : 17 - 19