Skip to main content

Performing an Audit or Security Test

  • Chapter
Security Planning
  • 2936 Accesses

Abstract

Compliance means that the organization and its actors adhere to applicable regulation and organizational policy and standards. Auditors are professional evaluators who test for compliance and/or that certain objectives are met. Therefore, understanding audit techniques professionalize testing, whether it is done for test or audit purposes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ludlow P (2013) OPINIONATOR; Hactivists as gadflies. New York Times, 14 April 2013

    Google Scholar 

  2. ISACA (2010) CISA review manual 2011. ISACA, Arlington Heights, IL, pp 33–72, 223–226

    Google Scholar 

  3. ISACA (2013) ITAF™: a professional practices framework for IS audit/assurance, 2nd edn. ISACA, Arlington Heights, IL, pp 9–40

    Google Scholar 

  4. SANS (2005) 507.1 auditing principles and concepts. SANS Institute. www.sans.org, Bethesda, MD

  5. Harris S (2013) All-in-one CISSP® exam guide, 6th edn. McGraw-Hill Co., New York, NY, pp 121–125

    Google Scholar 

  6. ISACA (2013) IS audit and assurance guideline 2202 risk assessment in planning exposure, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–10

    Google Scholar 

  7. ISACA (2013) IS audit and assurance guideline 2201 engagement planning, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–8

    Google Scholar 

  8. ISACA (2013) IS audit and assurance guideline 2401 reporting, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–10

    Google Scholar 

  9. Walker M (2012) All-in-one CEHâ„¢ certified ethical hacker exam guide. McGraw-Hill Co., New York, NY

    Google Scholar 

  10. Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013

  11. Payment Card Industry (2013) Payment card industry, requirements and security assessment procedures, ver 3.0, November 2013. www.pcisecuritystandards.org

  12. ISACA (2013) IS audit and assurance guideline 2208 sampling, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lincke, S. (2015). Performing an Audit or Security Test. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16027-6_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16026-9

  • Online ISBN: 978-3-319-16027-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics