INDEX

A

AAA authentication, 132

AAA logging, 131

AAA servers, 129

absolute paths, 174

acceptance testing, 382

access control systems, 87

access controls

applications, 325–329

internal controls for, 37

physical access, 93–98

routers/switches, 132

SOX compliance, 422–423

third-party vendors, 75–76

web applications, 227–228

access points (APs), 295, 296–304

accounting fraud, 417–426

action plans, 49, 50, 53–55

Active Directory, 179–180

Address Resolution Protocol (ARP) tables, 304

administrative threats, 452–453

administrators

applications, 325–326

storage, 275–276

Unix/Linux, 186–187

virtualized environments, 284

Windows, 161–162

Advanced Research Projects Agency (ARPA), 119

Advanced Research Projects Agency Network (ARPANET), 119, 120

alarm systems, ...

Get IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.