Sigler, Ken

Securing an IT organization through governance, risk management, and audit Ken Sigler, Dr. James L. Rainey, III - Boca Raton : CRC Press, c2016. - xxviii, 367 p. : ill. ; 25 cm. - Internal audit and IT audit .

Part 1. Cybersecurity risk management and the framework for improving critical infrastructure cybersecurity -- part 2. Cybersecurity, governance, audit, and the COBIT 5 framework.

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.

9781498737319


Information technology--Management
BUSINESS & ECONOMICS / Industrial Management

004.068