PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Supporting Applications Development and Operation Using IT Security and Audit Measures

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The market success of the enterprises depends on the ability to support their business processes. This involves the requirement of a seamless, well-ordered operation of the whole company. Operation is greatly afiected by the quality of its IT support. The information should be available, handled confidentially, preserving its integrity, have to be processed in a reliable, eficient, efiective way, in compliance with the requirements of supervisory authorities. Extending the scope of these information criteria to criteria determining operations quality and adding two business-level requirements to them makes possible to find preventive, detective and corrective, originally information security control measures, raised to the level of operational quality, that support the market success of the institutions.
Słowa kluczowe
Rocznik
Strony
27--37
Opis fizyczny
Bibliogr. 16 poz.
Twórcy
autor
Bibliografia
  • [1] “Cobit 4.1 framework, management guidelines, maturity models,” 2007.
  • [2] K. Szenes, “It grc versus? enterprise grc but: It grc is a basis of strategic governance,” in EuroCACS 2010 – Conf. on Computer Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2010.
  • [3] “Building a corporate risk management methodology and practice,” in EuroCACS 2002 – Conf. for IS Audit, Control and Security. Budapest, Hungary: ISACA, Rolling Meadows, Illinois, USA, March 2002.
  • [4] “On the intelligent and secure scheduling of web services in service oriented architectures – soas,” in Procds. of the 7th International Symposium of Hungarian Researchers on Computational Intelligence, Budapest, Hungary, November 2006, pp. 473–482.
  • [5] P. Williams, J. Spangenberg, and S. Kovaleva, “It and shareholder return: Creating value in the shareholder industry,” Information Systems Control Journal, Vol. 4, pp. 39–42, 2007.
  • [6] “Oasis – organization for the advancement of structured information standards,” http://www.oasis-open.org.
  • [7] M. Yoshioka, T. Sodo, A. Yoshikawa, and K. Sakata, “Legacy system integration technology for legacy application utilization from distributed object environment,” Hitachi Review, Vol. 47, No. 6, pp. 284–290, 1998.
  • [8] S. Bennett, S. McRobb, and R. Farmer, “Object-oriented systems analysis and design using uml chapter 12 system architecture,” 2006.
  • [9] C. Nelson, J. Miller, W. Farrell, R. Reinitz, and K. Brown, “Implementing a service – oriented architecture version 1.0,” 8 2005.
  • [10] D. Melancon, “Security controls that work,” IS Control Journal, Vol. 4, 2007.
  • [11] J. van Hoof, “Client server versus publish subscribe,” http://soa-eda.blogspot.com/2010/09/clientserver-versus-publishsubscribe.html.
  • [12] “Liberty alliance,” http://www.projectliberty.org.
  • [13] “W3c – world wide web consortium,” http://www.w3.org.
  • [14] C. Everett, “Oracle spreads into the middle infosecurity today,” pp. 34–36, July/August 2006.
  • [15] J. H. White, “Important but often dismissed:Internal control in a microsoft access database,”Information Systems Control Journal, Vol. 6, pp.30–34, 2006.
  • [16] D. Perelman-Hal, “Ajax and record locking,” Dr.Dobb’s Journal, pp. 45–51, October 2006.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPW7-0024-0002
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.