Auditing the IT security function

被引:7
|
作者
Osborne, K [1 ]
机构
[1] ICL, Bracknell RG12 8SN, Berks, England
关键词
D O I
10.1016/S0167-4048(97)80248-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The audit of the IT security function is the same as the audit of any other line function. A number of aspects should be examined. The first is to see whether the IT security function's approach is aligned with the five key pointers for effectiveness. From the management perspective, it is should be determined whether the IT security function is effectively communicating IT security policies and requirements to the organization as a whole. On the technical side, the IT security function's responsibilities for security products, both hardware and software should be examined. It must also be seen how effectively the function has defined its requirements, evaluated and selected products, and implemented them. Also, the public face of the IT security function should be examined to see how outward facing the function is. Finally, aspects such as internal controls, cost-effectiveness and value-for-money should be considered.
引用
收藏
页码:34 / 41
页数:8
相关论文
共 50 条
  • [31] Designing security auditing protocol with Web browsers
    Lee, HJ
    Song, JH
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 364 - 376
  • [32] On the security of auditing mechanisms for secure cloud storage
    Yu, Yong
    Niu, Lei
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 127 - 132
  • [33] ProSAS: Proactive Security Auditing System for Clouds
    Majumdar, Suryadipta
    Chawla, Gagandeep Singh
    Alimohammadifar, Amir
    Madi, Taous
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2517 - 2534
  • [34] Feasibility of automated information security compliance auditing
    Longley, D.
    Branagan, M.
    Caelli, W. J.
    Kwok, L. F.
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 493 - +
  • [35] Security slicing for auditing common injection vulnerabilities
    Thome, Julian
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 766 - 783
  • [36] Security of Auditing Protocols Against Subversion Attacks
    Lv, Jiaxian
    Wang, Yi
    Su, Jinshu
    Chen, Rongmao
    Wu, Wenjun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 193 - 206
  • [37] THE AUDITING FUNCTION IN THE FEDERAL GOVERNMENT
    Hunter, Joel
    ACCOUNTING REVIEW, 1942, 17 (03): : 221 - 232
  • [38] AUDITING FUNCTION FOR STAFF PHARMACISTS
    HABEGER, HE
    HARDY, DL
    AMERICAN JOURNAL OF HOSPITAL PHARMACY, 1985, 42 (05): : 1038 - &
  • [39] QUALITY AUDITING AS A MANAGEMENT FUNCTION
    MARASH, SA
    QUALITY PROGRESS, 1983, 16 (02) : 37 - 37
  • [40] ASSURANCE FUNCTION - AUDITING AT CROSSROADS
    CARMICHA.DR
    JOURNAL OF ACCOUNTANCY, 1974, 138 (03): : 64 - 72