Sox Compliance: Eleven Essential Controls for Sme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Sarbanes-Oxley (SOX) act, was enacted in 2002, in the wake of large accounting scandals ENRON and WORLDCOM .Especially for SMEs (small to mid-sized enterprises) that can benefit from implementing the control objectives, for governance, compliance and improved security. SOX compliance did not gave detailedrequirements for IT compliance, therefore many auditors adopted COBIT and COBIT guidelines to comply with SOX. This research discusses the latest sox developments in the SME, key findings from ISACA study and COBIT control objectives to satisfy internal IT controls .This compliance escalates and maps out internal it controls that protect information assets.
Authors and Affiliations
Utkarshni Sharma
Selecting the correct Data Mining Method: Classification & InDaMiTe-R
One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision requir...
Securing Biomtric Template Over Non-Secure Channel using Cryptography and Helping Data
Abstract: the security of biometric template is a very important aspect in the biometric system. Biometric template are the very important parts of biometric systems and attacker mostly attack on template over nonsecure...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (VANETs)
Vehicular communication is considered to be a backbone for many critical safety applications. In order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and ...
Key Policy Attribute Based Encryption in Cloud Storage
Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared...
Comprehensive Review: Intrusion Detection System and Techniques
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there i...