IBM Security zSecure Audit
ثبت نشده
چکیده
●● ● ●Leverage tailored reporting to generate baseline verifications of security Security is a cornerstone of any organization’s control environment, and in today’s networked economy, it is essential to have effective protection against IT threats. Security breaches can result in financial losses, unauthorized access to confidential information, theft of intellectual property, service disruption and damaging publicity.
منابع مشابه
IBM Security zSecure suite
●● ● ●Automate routine administrative tasks to help reduce costs, improve productivity and enforce policy Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. Mistakes such as unintentional configuration errors an...
متن کاملGeneralized Audit Trail Requirements and Concepts for Data Base Applications
a data base audit trail. It is defined here to be a generalized recording of " who did what to whom, when, and in what sequence. " This information is to be used to satisfy system integrity, recovery, auditing, and security requirements of advanced integrated data baseldata communications systems. This paper hypothesizes what information must be retained in the audit trail to permit recovery an...
متن کاملThe Application of the Security Audit Method on the Selected Objects of Critical Infrastructure
The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the prot...
متن کاملThe Simple Information Security Audit Process: SISAP
The SISAP (Simple Information Security Audit Process) is a dynamic security audit methodology fully compliant with the ISO 17799 and BS 7799.2, and conformant with the ISO 14508 in terms of its functionality guidelines. The SISAP employs a simulation-based rule base generator that balances risks and business value generation capabilities using the Plan-Do-Check-Act cycle imposed in BS 7799.2. T...
متن کاملRequirements for Development of an Assessment System for IT&C Security Audit
IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The evidences are gathered by audit team and some automation process...
متن کامل