IDEAS home Printed from https://ideas.repec.org/a/but/manage/v7y2008i1p76-82.html
   My bibliography  Save this article

Conducting an information security audit

Author

Listed:
  • Gheorghe Popescu

    (Academy of Economic Studies)

  • Adriana Popescu

    (Academy of Economic Studies)

  • Cristina Raluca Popescu

    (University of Bucharest)

Abstract

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become much more important as all levels of government and entities utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious attacks from individuals and groups, considering that there are many current computer systems with only limited security precautions in place. As we already know financial audits are the most common examinations that a business manager en- counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical security audits. However, they are unlikely to be acquainted with information security audits; that is an audit of how the confidentiality, availability and integrity of an organization'Â’s information are assured. Any way, if not, they should be, especially that an information security audit is one of the best ways to determine the security of an organization'Â’s information without incurring the cost and other associated damages of a security incident.

Suggested Citation

  • Gheorghe Popescu & Adriana Popescu & Cristina Raluca Popescu, 2008. "Conducting an information security audit," Manager Journal, Faculty of Business and Administration, University of Bucharest, vol. 7(1), pages 76-82, May.
  • Handle: RePEc:but:manage:v:7:y:2008:i:1:p:76-82
    as

    Download full text from publisher

    File URL: http://manager.faa.ro/download/496_714.pdf
    Download Restriction: no

    File URL: http://manager.faa.ro/en/article/Conducting-an-information-security-audit~496.html
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:but:manage:v:7:y:2008:i:1:p:76-82. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Cosmin Catalin Olteanu (email available below). General contact details of provider: https://edirc.repec.org/data/faaubro.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.