Auditing the IT security function

被引:7
|
作者
Osborne, K [1 ]
机构
[1] ICL, Bracknell RG12 8SN, Berks, England
关键词
D O I
10.1016/S0167-4048(97)80248-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The audit of the IT security function is the same as the audit of any other line function. A number of aspects should be examined. The first is to see whether the IT security function's approach is aligned with the five key pointers for effectiveness. From the management perspective, it is should be determined whether the IT security function is effectively communicating IT security policies and requirements to the organization as a whole. On the technical side, the IT security function's responsibilities for security products, both hardware and software should be examined. It must also be seen how effectively the function has defined its requirements, evaluated and selected products, and implemented them. Also, the public face of the IT security function should be examined to see how outward facing the function is. Finally, aspects such as internal controls, cost-effectiveness and value-for-money should be considered.
引用
收藏
页码:34 / 41
页数:8
相关论文
共 50 条
  • [1] Security and auditing of VPN
    Boukari, N
    Aljane, A
    THIRD INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS, PROCEEDINGS, 1996, : 132 - 138
  • [2] Security Auditing in the Fog
    Parkinson, Simon
    Qin, Yongrui
    Khan, Saad
    Vallati, Mauro
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [3] A security evaluation framework for cloud security auditing
    Rizvi, Syed
    Ryoo, Jungwoo
    Kissell, John
    Aiken, William
    Liu, Yuhong
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5774 - 5796
  • [4] A security evaluation framework for cloud security auditing
    Syed Rizvi
    Jungwoo Ryoo
    John Kissell
    William Aiken
    Yuhong Liu
    The Journal of Supercomputing, 2018, 74 : 5774 - 5796
  • [5] Auditing and Security of ERP Systems
    Bradford, Marianne
    Herman, Bob
    AMCIS 2017 PROCEEDINGS, 2017,
  • [6] QUEST - A SECURITY AUDITING TOOL
    KAPILOW, SA
    CHEREPOV, M
    AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 65 - 71
  • [7] Security-auditing in a softswitch
    Choudhary, AR
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 292 - 293
  • [8] Auditing Security of Information Flows
    Kozlovs, Dmitrijs
    Kirikova, Marite
    PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, BIR 2016, 2016, 261 : 204 - 219
  • [9] Automation of code auditing for security
    Whittaker, W
    PROCEEDINGS OF THE PERL CONFERENCE 4.0, 2000, : 123 - 126
  • [10] Teaching database security and auditing
    Department of Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN 37403, United States
    SIGCSE Bull. Inroads, 2009, 1 (241-245):