sponsored by ComputerWeekly.com
Posted:  20 Oct 2011
Published:  09 Nov 2010
Format:  PDF
Length:  5  Page(s)
Type:  White Paper
Language:  English

IT audit is about the formal verification and validation of the quality and effectiveness of IT
controls to support the overall business control objectives. From a security control
perspective the residual IT security risks are relatively well understood in a network
perimeter protected environment. This perimeter-based protection model has led to an IT
audit practice that has matured into given sets of frameworks, methodologies, approaches,
and models with certain sets of assumptions. CobiT (Control Objectives for Information and
Related Technology) represents such maturity in IT control frameworks and is commonly
referenced among IT auditors.

Compliance (Systems Operations) | Compliance Audits

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement