The National Bureau of Standards, with the support of the U.S. General Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March 22-24, 1977. Its purpose was to explore the state-of-the-art in this area and define appropriate subjects for future research. Leading experts in the audit and computer communities were invited to discuss the subject in one of ten sessions, each of which considered a different aspect. A consensus report was produced by each of the ten sessions and these reports form the body of these Proceedings. The ten topics reported on are: Internal Audit Standards, Qualifications and Training, Security Administration, Audit Considerations in Various System Environments, Administrative and Physical Controls, Program Integrity, Data Integrity, Communications, Post-Processing Audit Tools and Techniques, and Interactive Audit Tools and Techniques.
The National Bureau of Standards, with the support of the U.S. General Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March 22-24, 1977. Its purpose was to explore the state-of-the-art in this area and define...
See full abstract
The National Bureau of Standards, with the support of the U.S. General Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March 22-24, 1977. Its purpose was to explore the state-of-the-art in this area and define appropriate subjects for future research. Leading experts in the audit and computer communities were invited to discuss the subject in one of ten sessions, each of which considered a different aspect. A consensus report was produced by each of the ten sessions and these reports form the body of these Proceedings. The ten topics reported on are: Internal Audit Standards, Qualifications and Training, Security Administration, Audit Considerations in Various System Environments, Administrative and Physical Controls, Program Integrity, Data Integrity, Communications, Post-Processing Audit Tools and Techniques, and Interactive Audit Tools and Techniques.
Hide full abstract
Keywords
audit standards; audit techniques; audit tools; audit training; communications security; computer controls; computer security; data integrity; interactive audit; internal audit; postprocessing audit; program integrity