Universitatea din Bucuresti, Facultatea de Administratie si Afaceri

Creative Commons License
Content on this site is licensed under Creative Commons Attribution-ShareAlike 4.0

Double Blind Review Evaluation




ISSN-L 1453-0503
ISSN (e) 2286-170X
ISSN (p) 1453-0503



Elisabeta Queen
No. 4 - 12, District 1,
Bucharest, Romania

see area map


Tel: +4 021 310 49 20
Fax: +4 021 310 49 20



Site Vechi/ Old Site


Conducting an information security audit


download file

Creative Commons License

  1. Authors:
      • Prof. Ph.D . Gheorghe Popescu, Afiliation: Academy of Economic Studies
      • Prof. Ph.D . Adriana Popescu , Afiliation: Academy of Economic Studies
      • University Junior Assistant, Ph.D. Attendant Cristina Raluca Popescu, Afiliation: University of Bucharest

      • 76|82

  2. Keywords: Computer security audit, IT security, informational systems’ audit, information security management system, IS security policies, firewall

  3. Abstract:
    The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become much more important as all levels of government and entities utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious attacks from individuals and groups, considering that there are many current computer systems with only limited security precautions in place.
    As we already know financial audits are the most common examinations that a business manager en- counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical security audits. However, they are unlikely to be acquainted with information security audits; that is an audit of how the confidentiality, availability and integrity of an organization'’s information are assured. Any way, if not, they should be, especially that an information security audit is one of the best ways to determine the security of an organization'’s information without incurring the cost and other associated damages of a security incident.

download file

Creative Commons License


  1. Manager, indexed by Directory of Research Journals Indexing

    Manager is included in Directory of Research Journals Indexing . For details

  2. Manager, indexed by Google Scholar Database

     Manager  is included in  Google Scholar  Database. For

  3. Manager, indexed by PROQUEST Database

     Manager  is included in  PROQUEST Database. For details

  4. Manager, indexed by INDEX COPERNICUS Database

    Manager  is included in INDEX COPERNICUS Database. For details

  5. Manager, indexed by DOAJ Database

    Manager is included in DOAJ Database. For details : http://www.doaj.org/doaj?func=openurl&genre=journal&issn=14530503

  6. Manager, indexed by RePEc Database

     Manager  is included in  RePEc Database. For details :

  7. Manager, indexed by CEEOL Database

    Manager is included in the International Database CEEOL-Central and Eastern European 

  8. Manager, indexed by EBSCO-CEEAS Database

     Manager  is included in  EBSCO-CEEAS Database. For details :