Abstract
Compliance means that the organization and its actors adhere to applicable regulation and organizational policy and standards. Auditors are professional evaluators who test for compliance and/or that certain objectives are met. Therefore, understanding audit techniques professionalize testing, whether it is done for test or audit purposes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ludlow P (2013) OPINIONATOR; Hactivists as gadflies. New York Times, 14 April 2013
ISACA (2010) CISA review manual 2011. ISACA, Arlington Heights, IL, pp 33–72, 223–226
ISACA (2013) ITAF™: a professional practices framework for IS audit/assurance, 2nd edn. ISACA, Arlington Heights, IL, pp 9–40
SANS (2005) 507.1 auditing principles and concepts. SANS Institute. www.sans.org, Bethesda, MD
Harris S (2013) All-in-one CISSP® exam guide, 6th edn. McGraw-Hill Co., New York, NY, pp 121–125
ISACA (2013) IS audit and assurance guideline 2202 risk assessment in planning exposure, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–10
ISACA (2013) IS audit and assurance guideline 2201 engagement planning, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–8
ISACA (2013) IS audit and assurance guideline 2401 reporting, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–10
Walker M (2012) All-in-one CEHâ„¢ certified ethical hacker exam guide. McGraw-Hill Co., New York, NY
Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013
Payment Card Industry (2013) Payment card industry, requirements and security assessment procedures, ver 3.0, November 2013. www.pcisecuritystandards.org
ISACA (2013) IS audit and assurance guideline 2208 sampling, EXPOSURE DRAFT. ISACA, Arlington Heights, IL, pp 2–9
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lincke, S. (2015). Performing an Audit or Security Test. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-16027-6_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16026-9
Online ISBN: 978-3-319-16027-6
eBook Packages: Computer ScienceComputer Science (R0)