INDEX
A
AAA authentication, 132
AAA logging, 131
AAA servers, 129
absolute paths, 174
acceptance testing, 382
access control systems, 87
access controls
applications, 325–329
internal controls for, 37
physical access, 93–98
routers/switches, 132
SOX compliance, 422–423
third-party vendors, 75–76
web applications, 227–228
access points (APs), 295, 296–304
accounting fraud, 417–426
Active Directory, 179–180
Address Resolution Protocol (ARP) tables, 304
administrative threats, 452–453
administrators
applications, 325–326
storage, 275–276
Unix/Linux, 186–187
virtualized environments, 284
Windows, 161–162
Advanced Research Projects Agency (ARPA), 119
Advanced Research Projects Agency Network (ARPANET), 119, 120
alarm systems, ...
Get IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.