Index
Abuse
Acceptance testing
Accident
Accountability
Accounting
association
controls
data
entries
principles
unacceptable
Access
controls
control lists
control logs
control software
database
inadequate
logical
physical
role-based
unauthorized
Accuracy
auditing
and completeness
Administration
centralized
data
database
release and versions
security
systems
ACF2
Air conditioning
Analytical
evidence
review
steps
ANSI
Application
audits
audit tools
controls
failures
integrity
portfolio
programs
reviews
software
software security
systems
Approval
Audit program
board
certification
design
digital certificate
project
purchase
run schedules
supervisory
technical review
Assets
access to
at risk
control over
examination of
insurance
inventory of
liquidity of
loss of
register
safeguarding
security of
under control
Audit
charter
committee
compliance
evidence
management
operational
planning
procedures
program
report
scope
software
standards
steps
techniques
testing
tools
trail
Authorization
access
change
checks
levels
payments
requests
transactions
user
Backup
adequate
appropriate
copies
forensic
media
production of
skills
taking
theft of
Batch processing
Binary
Bits
Budget
Business
interruption
objectives
process reengineering
risk
unclear objectives
Cadbury
Capacity planning
Carbon dioxide
Card
credit
identity
laser
locks
punched
smart
Catastrophe
Certification authority
Chain of custody
Change control
Chart
bar
organization
PERT
Gantt
Check
authorization
background
format
lists
points ...