The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Audits in Cybersecurity
Abstract
The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NIST SP 800-53, NIST CSF v1.1, IIA, PCI DSS, ITAF, COSO, ENISA, NERC CIP, and CSAM.
Related Content
Mohd Azeem Faizi Noor, Saba Khanum, Taushif Anwar, Manzoor Ansari.
© 2023.
20 pages.
|
Padmavathi U., Narendran Rajagopalan.
© 2023.
16 pages.
|
Chandrasekar Ravi, Praveensankar Manimaran.
© 2023.
12 pages.
|
Jay Kumar Jain, Varsha Jain.
© 2023.
18 pages.
|
Dominik Hromada, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão.
© 2023.
21 pages.
|
Santosh Kumar Smmarwar, Govind P. Gupta, Sanjay Kumar.
© 2023.
20 pages.
|
Andreia Robert Lopes, Ana Sofia Dias, Bebiana Sá-Moura.
© 2023.
24 pages.
|
|
|