Home Page Icon
Home Page
Table of Contents for
4. Being Audited
Close
4. Being Audited
by Raymond Pompon
IT Security Risk Control Management: An Audit Preparation Plan
Cover
Frontmatter
1. Getting a Handle on Things
1. Why Audit?
2. Assume Breach
3. Risk Analysis: Assets and Impacts
4. Risk Analysis: Natural Threats
5. Risk Analysis: Adversarial Risk
2. Wrangling the Organization
6. Scope
7. Governance
8. Talking to the Suits
9. Talking to the Techs
10. Talking to the Users
3. Managing Risk with Controls
11. Policy
12. Control Design
13. Administrative Controls
14. Vulnerability Management
15. People Controls
16. Logical Access Control
17. Network Security
18. More Technical Controls
19. Physical Security Controls
20. Response Controls
4. Being Audited
21. Starting the Audit
22. Internal Audit
23. Third-Party Security
24. Post Audit Improvement
Backmatter
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
20. Response Controls
Next
Next Chapter
21. Starting the Audit
Part IV
Being Audited
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset