Auditing the IT security function

被引:7
|
作者
Osborne, K [1 ]
机构
[1] ICL, Bracknell RG12 8SN, Berks, England
关键词
D O I
10.1016/S0167-4048(97)80248-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The audit of the IT security function is the same as the audit of any other line function. A number of aspects should be examined. The first is to see whether the IT security function's approach is aligned with the five key pointers for effectiveness. From the management perspective, it is should be determined whether the IT security function is effectively communicating IT security policies and requirements to the organization as a whole. On the technical side, the IT security function's responsibilities for security products, both hardware and software should be examined. It must also be seen how effectively the function has defined its requirements, evaluated and selected products, and implemented them. Also, the public face of the IT security function should be examined to see how outward facing the function is. Finally, aspects such as internal controls, cost-effectiveness and value-for-money should be considered.
引用
收藏
页码:34 / 41
页数:8
相关论文
共 50 条
  • [21] Application of Security Metrics in Auditing Computer Network Security: A Case Study
    Premaratne, Upeka
    Samarabandu, Jagath
    Sidhu, Tarlochan
    Beresh, Bob
    Tan, Jian-Cheng
    2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 448 - +
  • [22] An effective modified security auditing tool (SAT)
    Mohamed, AB
    ITI 2001: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2001, : 37 - 41
  • [23] IT security auditing: A performance evaluation decision model
    Herath, Hemantha S. B.
    Herath, Tejaswini C.
    DECISION SUPPORT SYSTEMS, 2014, 57 : 54 - 63
  • [24] The Role of Accounting and Professional Associations in IT Security Auditing
    Islam, Sharif
    Jiang, Randi
    Poston, Robin S.
    Gal, Graham
    Phillips, Paul
    Stafford, Thomas F.
    AMCIS 2017 PROCEEDINGS, 2017,
  • [25] Extension to security auditing mechanism of Linux Shell
    Wang, Li-Dong
    Fang, Bin-Xing
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (01): : 80 - 84
  • [26] Cloud Security Auditing: Challenges and Emerging Approaches
    Ryoo, Jungwoo
    Rizvi, Syed
    Aiken, William
    Kissell, John
    IEEE SECURITY & PRIVACY, 2014, 12 (06) : 68 - 74
  • [27] Wireless Network Penetration Testing and Security Auditing
    Wang, Shao-Long
    Wang, Jian
    Feng, Chao
    Pan, Zhi-Peng
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [28] Autonomic 802.11 wireless LAN security auditing
    Branch, JW
    Petroni, NL
    Van Doorn, L
    Safford, D
    IEEE SECURITY & PRIVACY, 2004, 2 (03) : 56 - 65
  • [29] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79
  • [30] Distributed Information Security Auditing using Blockchains
    Konig, Lukas
    Pirker, Martin
    Tjoa, Simon
    Kieseberg, Peter
    ERCIM NEWS, 2024, (137):