Sox Compliance: Eleven Essential Controls for Sme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Sarbanes-Oxley (SOX) act, was enacted in 2002, in the wake of large accounting scandals ENRON and WORLDCOM .Especially for SMEs (small to mid-sized enterprises) that can benefit from implementing the control objectives, for governance, compliance and improved security. SOX compliance did not gave detailedrequirements for IT compliance, therefore many auditors adopted COBIT and COBIT guidelines to comply with SOX. This research discusses the latest sox developments in the SME, key findings from ISACA study and COBIT control objectives to satisfy internal IT controls .This compliance escalates and maps out internal it controls that protect information assets.
Authors and Affiliations
Utkarshni Sharma
Cryptanalysis and Security Enhancement of a Khan et al.'sScheme
Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplys...
Drowsy Driver Detection System: A Novel Approach Using Haar Like Features
There are many instances of road accidents round the world due to driver’s lack of attention in driving. One of the prime reasons can be drowsiness. In this paper, a drowsiness detection system using Haar like fe...
Database Applications in Analyzing Agents
Abstract: There are many situations in which two or more agents (e.g., human or computer decision makers)interact with each other repeatedly in settings that can be modeled as repeated stochastic games. In suchsitu...
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
Comparative Analysis of Smart Card Authentication Schemes
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a var...