|
Information security problems have become increasingly prominent in the media as electronic information system become more and more integrated into the day-to-day operations of every aspects of the modern organization.
The text divides in 4 parts.
Part 1 - Complete a threat and vulnerability analysis
Part 2 - Evaluating IT infrastructure security
Part 3 -The audit process
Part 4 - Implementing a computer security and fraud prevention audit: questions and answer
|