How to select a CAAT
CAAT stands for Computer Assisted Audit Techniques
This is a common thing of discussion among IS Auditors is "which one is best - CAATs or Manual method of IS Audit". Sometimes manual method is not enough to find out effective and efficient IS Audit results. On the other hand in many instances use of CAATs gives less efficient results than corresponding manual IS Audit methods.
Monday, November 24, 2008
How to select a CAAT
IP Security & Authentication Header (AH)
IP Security & Authentication Header (AH)
IP Security (IPSec) is a super set of protocols which to large extent ensure security of Internet Protocol (IP). Beside Internet Key Exchange (IKE) two other important protocol supported by IPSec are
1. Authentication Header (AH)
2. Encapsulating Security Payload (ESP)
Monday, November 17, 2008
Access Control in UNIX based operating systems
Access Control in UNIX based operating systems:
A lot of UNIX based operating systems are available. Although basic architecture is same for all these Operating System but they varies in functionality.
Friday, October 24, 2008
Vishing
Vishing like phishing is a socially engineered attempt to get your financial information. Unlike phishing rather than luring you to a website, it lures you to a phone number
read more
Antivirus Plasma
Antivirus Plasma is a faux security program that does not provide any additional security features or functions for your computer. As we thought, Antivirus Plasma is nothing more than another rogue application that performs various malicious actions to get computer users to purchase the Antivirus Plasma
read more
Friday, September 26, 2008
Chrome Antics: Did Google Reverse-Engineer Windows?
Since its release a few weeks ago, curious developers have been sniffing through the source code for Google's new Chrome web browser.
read more
The Hacker's Voice Digest Issue - No. 3 Released Today!!
Contents:# Rough guide to number stations - Part 3 By Demonix# History of BT Strowger Systems - By Belial# List of interesting phone numbers - Blue_Chimp# VoIP spectacular with 10nix and...# Hacking Vonage - Belial# Easy Peasy ID theift - Hyper# Urban Exploration - BT exchanges# Rants# News# Interviews# and a fuckton more!...
read more
Top 5 Very Important Security Tests For Your Computer
Until and unless you are not attacked by any virus or spyware you think that your computer security is very high but when your PC gets infected it is too late. So if you think that you have a good Internet security why not you go for some Internet Security Tests :
read more
IDS – an Information security tool to protect your network
How an Intrusion Detection System or IDS can help Network administrator, Information Security professionals, IS Auditors and Penetration testers for detection of any external or internal network intrusion(s)...
read more | digg story
Thrown in the Fire - Database Corruption Investigation
Analyzing an incident when the manufacturer claims that it's an operator error and the operator claims that it is an application error is one of the most daunting tasks of a security officer.
read more
Subscribe free via email
My Favourite Blog List
Blog to watch
Labels
- Access Control (1)
- Anti-Virus (2)
- Article from Others (47)
- backup and Recovery (1)
- CAAT (1)
- Cryptography (1)
- Cyber Security (11)
- Data Protection (6)
- Data Security (10)
- Decision Support System (1)
- DMZ (1)
- Error detection (2)
- Firewall (2)
- Firewall audit (2)
- Google (1)
- Hacking (4)
- Identity Stealing (3)
- IDS (1)
- Information Security (51)
- internet (5)
- IS Audit (5)
- IT Risk (3)
- Kerberos (1)
- Media disposal (1)
- Network Security (2)
- Networking (1)
- OpenID (1)
- Outsourcing (1)
- password (1)
- Penetration Testing (3)
- PKI (1)
- Privacy (1)
- Programming (1)
- SAS 70 (1)
- Single Sign-on (1)
- Social Engineering (1)
- SSO (1)
- sysAdmin (1)
- System Administration (1)
- Vulnerability Assessment (1)
- Web security (4)
- Wireless network (2)
- WLAN (1)