IBM Security zSecure Audit

ثبت نشده
چکیده

●● ● ●Leverage tailored reporting to generate baseline verifications of security Security is a cornerstone of any organization’s control environment, and in today’s networked economy, it is essential to have effective protection against IT threats. Security breaches can result in financial losses, unauthorized access to confidential information, theft of intellectual property, service disruption and damaging publicity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IBM Security zSecure suite

●● ● ●Automate routine administrative tasks to help reduce costs, improve productivity and enforce policy Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. Mistakes such as unintentional configuration errors an...

متن کامل

Generalized Audit Trail Requirements and Concepts for Data Base Applications

a data base audit trail. It is defined here to be a generalized recording of " who did what to whom, when, and in what sequence. " This information is to be used to satisfy system integrity, recovery, auditing, and security requirements of advanced integrated data baseldata communications systems. This paper hypothesizes what information must be retained in the audit trail to permit recovery an...

متن کامل

The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the prot...

متن کامل

The Simple Information Security Audit Process: SISAP

The SISAP (Simple Information Security Audit Process) is a dynamic security audit methodology fully compliant with the ISO 17799 and BS 7799.2, and conformant with the ISO 14508 in terms of its functionality guidelines. The SISAP employs a simulation-based rule base generator that balances risks and business value generation capabilities using the Plan-Do-Check-Act cycle imposed in BS 7799.2. T...

متن کامل

Requirements for Development of an Assessment System for IT&C Security Audit

IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The evidences are gathered by audit team and some automation process...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017