Skip to main content

Information Technology Security Audit.

It is a systematic technical measurable assessment of systems or application. It consists of manual as well as automated assessments. The manual assessments include interviewing the staff who handles the vulnerability check on the systems as well as handling the physical access to the system. The automated assessment includes system generated audit reports or monitoring using softwares. It is all managed through CAATs or CAATTs (Computer Aided Audit Techniques or Computer Aided Audit Tools and Techniques).
It is supported by most of the current enterprise operating systems due to the requirement of the “common criteria” (international standards for the operating systems related to security systems).


These audits are generally performed by the Certified Accountants, CISA(Certified Information Systems Auditor) offered by ISACA(Information Systems Audit and Control Association) , External Auditors, Consultants etc.

Comments

Popular posts from this blog

IoT: The Magic Wand Technology.

Just imagine how exciting and amazing this w orld would be if everything around us is connected, it would not only save our time but also reduce our unnecessary tensions and stress. And since human-kind has evolved and developed many-folds, thus, we have a super-power technology to turn this into reality and that’s termed as “ IoT ” or “ Internet of Things ” - the connection of Physical World with the Cyber World . Sounds fascinating, isn’t it? Now, let us see how it works in reality . The Cyber-Physical system is configured or designed by following these functions: ·         Connection level : It involves attachment-free or wireless communication, monitoring and recording the physical conditions of the environment using sensors and organizing them at a central location. ·         Conversion level (Data-to-information): Involves data-correlation, tracking of machine-failures, malfunctions, reduces dow...

All you want to know about UX/UI designers.

Have you ever imagined how do they build such beautiful web-pages and so much user friendly websites, or you yourself have dreamt of developing one of your own? Then you must be aware of UX/UI designing and learning about its applications would give you a complete idea of what you want to build and how would it look like in the real world. source: Google Images UX Design refers to the term  User Experience Design , while UI Design stands for  User Interface Design . Both elements are crucial to a product and work closely together. But despite their professional relationship, the roles themselves are quite different, referring to very different parts of the process  and the design discipline. Both of them have a plain goal of making the user interaction simpler and efficient . The User Experience Design or UX Design is more or less non-technical, as it involves content-development, prototyping, analysis and iteration, basically the interaction with the users ...

What is BIG DATA ANALYSIS ?

Big data analytics is the process of examining large and varied data sets -- i.e., big data(Black box Data, Social media Data, Stock Exchange Data, Search Engine Data, Transport Data, Power grid Data) -- to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions. Volume, Variety and Velocity are the three V’s of Big Data. A person involved in this kind-a-job is called to be a “Data Analyst”. And to receive this tag by large group of people he/she needs to be super good at statistics and if accompanied by software developing skills he/she would be called as “Data Scientist”. How to be a renowned and efficient data scientist? Technical Skills that the person needs to be good at are: Statistical methods and packages (e.g. SPSS) R and/or SAS languages Data warehousing and business intelligence platforms SQL databases and database querying languag...