Conducting an information security audit

Journal Title: Manager Journal - Year 2008, Vol 7, Issue

Abstract

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become much more important as all levels of government and entities utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious attacks from individuals and groups, considering that there are many current computer systems with only limited security precautions in place. As we already know financial audits are the most common examinations that a business manager en- counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical security audits. However, they are unlikely to be acquainted with information security audits; that is an audit of how the confidentiality, availability and integrity of an organization'’s information are assured. Any way, if not, they should be, especially that an information security audit is one of the best ways to determine the security of an organization'’s information without incurring the cost and other associated damages of a security incident.

Authors and Affiliations

Gheorghe N. POPESCU, Veronica Adriana POPESCU, Cristina Raluca POPESCU

Keywords

Related Articles

Integrated marketing communications:pathway for enhancing client-costomer relationships

The strategic coordination of marketing communication tools is vital and highly crucial for every result driven organization today. Companies must be able to deliver the right message to their target audience in order to...

Inflation Targeting as Monetary Policy Strategy in View of Romania'’s Adopting Euro as National Currency

On its way towards the European Union accession, Romania had undertaken a multitude of economic transformations that made the transit from the ineffective system of central planning to an institutional framework created...

Bank consolidation/capitalization in the Nigerian Commercial Bank(1986-2006):Causes,consequences and implication for the future

The CBN Governor noted that the vision or prospect of the CBN and the Federal Government of Nigeria is a banking system that is part of the global change, and which is strong and reliable. It is a banking system which mu...

Operational Research As Key Management Instrument

When coming about making decisions, individuals endeavour to correctly address issues and to choose the optimum variant among the available ones. Often, the decisional process is made based on the decision-maker philosop...

Spa Tourism Economy Băile Felix Balneoclimateric Resort - short presentation

Treatment tourism is a specific form of leisure treatment, that has increased due to certain illnesses, stress and professional illnesses. Because of this, treatment tourism is tied to many resorts known for their therap...

Download PDF file
  • EP ID EP451816
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Gheorghe N. POPESCU, Veronica Adriana POPESCU, Cristina Raluca POPESCU (2008). Conducting an information security audit. Manager Journal, 7(), 76-82. https://europub.co.uk/articles/-A-451816