Technology is evolving at an amazing pace and offering a vital benefit for businesses. On the other hand, it has also brought ever-increasing security threats. There is no agreed upon and well-suited security audit framework for tackling IT security challenges, and there is also no holistic approach for the audit process. Because of this lack of agreement, it is getting more challenging to monitor assets; confidentiality, integrity and availability (CIA); threats; vulnerability; risk; and control. This article proposed 8 audit processes in 1 hierarchical framework to understand and design visualizations on the previously mentioned security concepts. The following are a few of the benefits of using the framework:
ISACA® Volume 5, Sep 2016: for your further reading please refer https://www.isaca.org/Journal/Blog/Lists/Posts/Post.aspx?ID=333 AuthorShemlse G/Medhin Kassa, CISA, MSCS, CEH
0 Comments
Leave a Reply. |