Universitatea din Bucuresti, Facultatea de Administratie si Afaceri

Creative Commons License
Content on this site is licensed under Creative Commons Attribution-ShareAlike 4.0


Double Blind Review Evaluation

~~~~~~~~~~~~~~~~~

Indexed by : EBSCO-CEEAS | CEEOL | RePEc | DOAJ | INDEX COPERNICUS | PROQUEST | ULRICH | DRJI | Google Scholar

~~~~~~~~~~~~~~~~~

ISSN-L 1453-0503
ISSN (e) 2286-170X
ISSN (p) 1453-0503

~~~~~~~~~~~~~~~~~

Address

Elisabeta Queen
No. 4 - 12, District 1,
Bucharest, Romania

see area map

Phones

Tel: +4 021 310 49 20
Fax: +4 021 310 49 20

Email

manager@faa.ro

Site Vechi/ Old Site

~~~~~~~~~~~~~~~~~

Conducting an information security audit

 

download file

Creative Commons License

  1. Authors:
      • Prof. Ph.D . Gheorghe Popescu, Afiliation: Academy of Economic Studies
      • Prof. Ph.D . Adriana Popescu , Afiliation: Academy of Economic Studies
      • University Junior Assistant, Ph.D. Attendant Cristina Raluca Popescu, Afiliation: University of Bucharest

    Pages:
      • 76|82

  2. Keywords: Computer security audit, IT security, informational systems’ audit, information security management system, IS security policies, firewall

  3. Abstract:
    The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become much more important as all levels of government and entities utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious attacks from individuals and groups, considering that there are many current computer systems with only limited security precautions in place.
    As we already know financial audits are the most common examinations that a business manager en- counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical security audits. However, they are unlikely to be acquainted with information security audits; that is an audit of how the confidentiality, availability and integrity of an organization'’s information are assured. Any way, if not, they should be, especially that an information security audit is one of the best ways to determine the security of an organization'’s information without incurring the cost and other associated damages of a security incident.

download file

Creative Commons License

NEWS

  1. Manager, indexed by Directory of Research Journals Indexing

    Manager is included in Directory of Research Journals Indexing . For details

  2. Manager, indexed by Google Scholar Database

     Manager  is included in  Google Scholar  Database. For

  3. Manager, indexed by PROQUEST Database

     Manager  is included in  PROQUEST Database. For details

  4. Manager, indexed by INDEX COPERNICUS Database

    Manager  is included in INDEX COPERNICUS Database. For details

  5. Manager, indexed by DOAJ Database

    Manager is included in DOAJ Database. For details : http://www.doaj.org/doaj?func=openurl&genre=journal&issn=14530503

  6. Manager, indexed by RePEc Database

     Manager  is included in  RePEc Database. For details :

  7. Manager, indexed by CEEOL Database

    Manager is included in the International Database CEEOL-Central and Eastern European 

  8. Manager, indexed by EBSCO-CEEAS Database

     Manager  is included in  EBSCO-CEEAS Database. For details :