Published Papers

Chapter 22 - Operations Security

This chapter defines operations security. Organizational Operations Security is about maximizing the Confidentiality, Integrity and Availability of the systems used by the organization using a...

Published on: 2008-08-14

Topic: Audit

Chapter 21 - Information Systems Legislation

This chapter reviews the legislation and regulations impacting audit and other issues of electronic law. The foremost dilemma with the study of electronic law is that it is difficult to confine...

Published on: 2008-08-14

Topic: Audit

Chapter 20 - Risk Management, Security Compliance, and Audit Controls

This chapter deals with the risk management, security compliance, and audit controls. Major methods of risk measurement and audit are discussed. One must understand the risk management process as...

Published on: 2008-08-14

Topic: Audit

Chapter 19 - Other Systems

This chapter reviews a number of other audit systems and compliance issues. Auditing mainframe and other legacy systems is far simpler than auditing modern client/server systems. These systems are...

Published on: 2008-08-14

Topic: Audit

Chapter 18 - Auditing Web-Based Applications

This chapter introduces the concepts necessary to audit Web applications. The Web application would have to be set up in such a way that it acts as a server for all requests to the client. Some of...

Published on: 2008-08-14

Topic: Audit

Chapter 17 - Auditing UNIX and Linux

This chapter introduces the concepts of auditing UNIX and Linux. One of the key secrets to auditing UNIX or Linux is to ensure that one must have knowledgeable people available for the audit. The...

Published on: 2008-08-14

Topic: Audit

Chapter 16 - Microsoft Windows Security and Audits

This chapter discusses the concepts necessary in the performance of a technical audit of Microsoft Windows systems. The initial step in any audit is defining the scope. Most initial audits of...

Published on: 2008-08-14

Topic: Audit

Chapter 15 - Database Auditing

This chapter explores database auditing and the three of the primary database systems that are available today are focused. These database systems involve MySQL, Oracle, and Microsoft Sequel...

Published on: 2008-08-14

Topic: Audit

Chapter 14 - An Introduction to Systems Auditing

This chapter provides an introduction to system auditing. It overviews the processes needed to audit a system. Systems are a combination of hosts and processes. A system can be a host or even...

Published on: 2008-08-14

Topic: Audit

Chapter 13 - Analyzing the Results

This chapter illustrates a few simple methods to baseline the network at a high level. All external attacks and many internal ones will be initially based on the exploit of a network service....

Published on: 2008-08-14

Topic: Audit