Wiley Publishing
Security Controls for Sarbanes-Oxley
Section 404 IT Compliance
Authorization, Authentication,and Access
Dennis C. Brewer
Chapter 1 The Role of Information Technology Architecture in Information Systems Design
Chapter 2 Understanding Basic Concepts of Privacy and Data Protection
Chapter 3 Defining and Enforcing Architecture
Chapter 4 Combining External Forces, Internal Influences, and IT Assets
Chapter 5 Simplifying the Security Matrix
Chapter 6 Developing Directory-Based Access Control Strategies
Chapter 7 Integrating the Critical Elements
Chapter 8 Engineering Privacy Protection into Systems and Applications
Chapter 9 The Value of Data Inventory and Data Labeling
Chapter 10 Putting It All Together in the Web Applications Environment
Chapter 11 Why Federated Identity Schemes Fail
Chapter 12 A Pathway to Universal Two-Factor Authentication
Appendix A WWW Resources for Authentication, Authorization, and Access Control News and Information
Appendix B Important Access Control and Security Terms
Appendix C Critical Success Factors for Controls Design
Appendix D Sample Policy Statements for Compulsory Access and Security Controls
Appendix E Documentation Examples
Appendix F Sample Job Description for Directory Engineer/Schema Architect
'Working > IT Governance' 카테고리의 다른 글
SPICE 기반의 중소기업을 위한 소프트웨어 표준 프로세스 (0) | 2008.07.11 |
---|---|
Key Differences Between ITIL V2 and ITIL V3 (0) | 2008.04.24 |
‘사베인-옥슬리법’ 시행으로 내부통제시스템 구축에 비상 (0) | 2007.03.19 |