Skip to main content

Information Technology Security Audit.

It is a systematic technical measurable assessment of systems or application. It consists of manual as well as automated assessments. The manual assessments include interviewing the staff who handles the vulnerability check on the systems as well as handling the physical access to the system. The automated assessment includes system generated audit reports or monitoring using softwares. It is all managed through CAATs or CAATTs (Computer Aided Audit Techniques or Computer Aided Audit Tools and Techniques).
It is supported by most of the current enterprise operating systems due to the requirement of the “common criteria” (international standards for the operating systems related to security systems).


These audits are generally performed by the Certified Accountants, CISA(Certified Information Systems Auditor) offered by ISACA(Information Systems Audit and Control Association) , External Auditors, Consultants etc.

Comments

Popular posts from this blog

Blockchain: The future of Internet Technology

We all have heard the term “ Bitcoin ” or “ Blockchain ” from one source or the other. Does it makes you eager to know what it is? And why everyone is so interested about it? Well Bitcoins, as you may already know, is a cryptocurrency, based on Blockchain. So, this article deals with knowing the fundamentals and discovering the best resources which is present over the internet about Blockchain Technology . source: Google images Actually, Blockchain is a platform where one internet user can transfer assets , any digital property to any other user (familiar or unfamiliar) and the transfer is very safe, secure and legitimate as all the records of the transfer are maintained and these records(blocks) are decentralised (i.e. everyone has access to it and no single person owns it) but no-one can tamper with these records as they are highly encrypted . Every node(system) has the ability to update the record and the most popular record becomes the de-facto official record to becom...

IoT: The Magic Wand Technology.

Just imagine how exciting and amazing this w orld would be if everything around us is connected, it would not only save our time but also reduce our unnecessary tensions and stress. And since human-kind has evolved and developed many-folds, thus, we have a super-power technology to turn this into reality and that’s termed as “ IoT ” or “ Internet of Things ” - the connection of Physical World with the Cyber World . Sounds fascinating, isn’t it? Now, let us see how it works in reality . The Cyber-Physical system is configured or designed by following these functions: ·         Connection level : It involves attachment-free or wireless communication, monitoring and recording the physical conditions of the environment using sensors and organizing them at a central location. ·         Conversion level (Data-to-information): Involves data-correlation, tracking of machine-failures, malfunctions, reduces dow...

What is BIG DATA ANALYSIS ?

Big data analytics is the process of examining large and varied data sets -- i.e., big data(Black box Data, Social media Data, Stock Exchange Data, Search Engine Data, Transport Data, Power grid Data) -- to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions. Volume, Variety and Velocity are the three V’s of Big Data. A person involved in this kind-a-job is called to be a “Data Analyst”. And to receive this tag by large group of people he/she needs to be super good at statistics and if accompanied by software developing skills he/she would be called as “Data Scientist”. How to be a renowned and efficient data scientist? Technical Skills that the person needs to be good at are: Statistical methods and packages (e.g. SPSS) R and/or SAS languages Data warehousing and business intelligence platforms SQL databases and database querying languag...