Conducting an information security audit

Journal Title: Manager Journal - Year 2008, Vol 7, Issue

Abstract

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become much more important as all levels of government and entities utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious attacks from individuals and groups, considering that there are many current computer systems with only limited security precautions in place. As we already know financial audits are the most common examinations that a business manager en- counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical security audits. However, they are unlikely to be acquainted with information security audits; that is an audit of how the confidentiality, availability and integrity of an organization'’s information are assured. Any way, if not, they should be, especially that an information security audit is one of the best ways to determine the security of an organization'’s information without incurring the cost and other associated damages of a security incident.

Authors and Affiliations

Gheorghe N. POPESCU, Veronica Adriana POPESCU, Cristina Raluca POPESCU

Keywords

Related Articles

University management-improvements and dilemma in the of equal opportunities

Equal opportunity is a relatively new concept which first of all must be understood, and then implemented as a premise and note as a result of current activities. Equal opportunity in organizations is a new way of achiev...

Trust as a context for knowledge flows in co-opetition

Market circumstances related to changes of business environment resulted in the need to find new ways to engage in competitive struggle by companies. This has led to the emergence of cases of establishing cooperation bet...

Management Functions Particularities In The Competitive Intelligence Process

The manager is the key element in the process of information analysis inside a firm, especially because this process is used to make vast decisions, from strategic decisions to the most detailed tactical movements. It is...

An Exploratory Study of the Women Entrepreneurial Motivation in the South-West Nigeria

Women entrepreneurial motivation is a function of variables that are subject to authors and researchers’ opinions and views. These variables can be classified based on their impact on women entrepreneurial performance,...

The Level of Development and the Implementation of Accounting Standards in Kosovo - Problems and Challenges

This study will show an analysis of the current development in the accounting in Kosova and the overall financial reports. Financial reports, based on the accounting processes of the highest quality and accepted worldwid...

Download PDF file
  • EP ID EP451816
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Gheorghe N. POPESCU, Veronica Adriana POPESCU, Cristina Raluca POPESCU (2008). Conducting an information security audit. Manager Journal, 7(), 76-82. https://europub.co.uk/articles/-A-451816