Internal Control For Information Security: Annotated Bibliography Annotated Bibliography

¶ … Internal Control for Information Security: Annotated Bibliography Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog:

http://wikibon.org/blog/making-the-case-for-network-security/

This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and other practically interested personnel, the language is a bit too full of professional jargon and other needless complications, however the basic facts that the author lays out and the conclusions drawn from these facts and their relationship are quite straightforward and clear. Though not providing any truly in-depth and concrete data or profound insights, this presents overview information that is directly related to the investigation of network and information security.

Information: Complying with the Safeguards Rule. (n.d.). Retrieved from Bureau of Consumer Protection: http://www.business.ftc.gov/documents/bus54-

...

After providing this overview definition of different types of institutions that must comply with the safeguard rules, a broad description of the rules themselves and the areas of concern for information security and the protection financial information in networks is also provided, and recommendations and guidelines to help companies ensure compliance (and to inform consumers of their rights in regards to the protection of their financial information) are also supplied. Though not exactly related to the technical how-tos of providing information and network security, this source does provide an understanding of the practical ends and the legislative imperatives applicable to the area of investigation.
Schneider, G.P. (2009). Electronic Commerce Security. In G.P. Schneider,

Electronic Commerce (p. 459). Boston, MA: Cengage Learning.

A chapter in a larger…

Cite this Document:

"Internal Control For Information Security Annotated Bibliography" (2012, May 03) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/internal-control-for-information-security-79794

"Internal Control For Information Security Annotated Bibliography" 03 May 2012. Web.16 April. 2024. <
https://www.paperdue.com/essay/internal-control-for-information-security-79794>

"Internal Control For Information Security Annotated Bibliography", 03 May 2012, Accessed.16 April. 2024,
https://www.paperdue.com/essay/internal-control-for-information-security-79794

Related Documents

US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand. Spremic, M., Ivanov, M., Jackovic, B.

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Ge, L., & Voss, S.. (2009). ERP application in China: An overview. International Journal of Production Economics, 122(1), 501. Of the many challenges of planning, implementing and using ERP systems in China, the two greatest unmet needs of these systems on a consistent basis is business intelligence and data analytics. This analysis evaluates these two unmet needs from the standpoint of their use in supply chains. Included in the analysis is

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the

Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd. The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail

Public Safety Administration Challenges; Annotated Bibliography Cook, C. (September 1, 2012). The Challenges and Opportunities for Public Safety Communications: The Adams County Case Study. Silicon Flatirons Center On the 23rd of September in the year 2011, scholars, law professionals and members of public safety communications industry were brought together by the Silicon Flatirons Center to discuss issues that faced the industry in the 21st century, both in terms of benefits and challenges