Security Management, Integrity, and Internal Control in Information Systems

Security Management, Integrity, and Internal Control in Information Systems

Author: Steve Furnell

Publisher: Springer

Published: 2006-06-03

Total Pages: 367

ISBN-13: 038731167X

DOWNLOAD EBOOK

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.


Standards for Internal Control in the Federal Government

Standards for Internal Control in the Federal Government

Author: United States Government Accountability Office

Publisher: Lulu.com

Published: 2019-03-24

Total Pages: 88

ISBN-13: 0359541828

DOWNLOAD EBOOK

Policymakers and program managers are continually seeking ways to improve accountability in achieving an entity's mission. A key factor in improving accountability in achieving an entity's mission is to implement an effective internal control system. An effective internal control system helps an entity adapt to shifting environments, evolving demands, changing risks, and new priorities. As programs change and entities strive to improve operational processes and implement new technology, management continually evaluates its internal control system so that it is effective and updated when necessary. Section 3512 (c) and (d) of Title 31 of the United States Code (commonly known as the Federal Managers' Financial Integrity Act (FMFIA)) requires the Comptroller General to issue standards for internal control in the federal government.


Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Integrity, Internal Control and Security in Information Systems

Integrity, Internal Control and Security in Information Systems

Author: Michael Gertz

Publisher: Springer

Published: 2013-11-11

Total Pages: 203

ISBN-13: 0387355839

DOWNLOAD EBOOK

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.


Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM)

Author: Robert F. Dacey

Publisher: DIANE Publishing

Published: 2010-11

Total Pages: 601

ISBN-13: 1437914063

DOWNLOAD EBOOK

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.


Integrity and Internal Control in Information Systems V

Integrity and Internal Control in Information Systems V

Author: Michael Gertz

Publisher: Springer

Published: 2013-06-05

Total Pages: 223

ISBN-13: 0387356932

DOWNLOAD EBOOK

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.


Computer Information Systems - Analysis and Technologies

Computer Information Systems - Analysis and Technologies

Author: Nabendu Chaki

Publisher: Springer Science & Business Media

Published: 2011-12-06

Total Pages: 337

ISBN-13: 3642272444

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 10th International Conference on Computer Information Systems, CISIM 2011, held in Kolkata, India, in December 2011. The 30 revised full papers presented together with 6 keynote tasks and plenary lectures were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on networking and its applications; agent-based systems; biometric applications; pattern recognition and image processing; industrial applications; algorithmic applications and data management; information and network security.


Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business

Author: Costas Lambrinoudakis

Publisher: Springer

Published: 2007-08-18

Total Pages: 302

ISBN-13: 3540744096

DOWNLOAD EBOOK

This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.


Information security economics

Information security economics

Author: Saèd El Aoufi

Publisher: The Stationery Office

Published: 2011-07-29

Total Pages: 276

ISBN-13: 9780117068728

DOWNLOAD EBOOK

This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources. The author: establishes a foundation for understanding the broader field of information security economics; identifies key challenges that organisations face as regards the ever-increasing threat profiles involved in information security; illustrates the importance of linking information security with risk management; explores the economics of information security from a cost-benefit perspective; demonstrates how information security metrics can identify where security performance is weakest, assist management to support security initiatives, and allow performance targets to be achieved; establishes ways in which organisations need to prioritise information security requirements and controls, in order to maintain cost-effective deployment in a business environment which may have limited resources; and gives practical recommendations to help organisations to proceed with the economic evaluation of information security.