Summary
In this chapter, you studied in detail the various frameworks and standards for information assets, different access control parameters, and biometrics-related risks and controls.
You learned about relevant skills to conduct an audit in accordance with the IS audit standards and a risk-based IS audit strategy, as well as evaluating potential opportunities and threats associated with emerging technologies, regulations, and industry practices.
The following are some important topics you covered in this chapter:
- Logical access controls are the most effective way to safeguard critical data within information processing facilities. Logical access controls are technical controls, such as authentication, encryption, firewalls, and IDSs, which are very difficult to bypass by a layperson.
- It is the responsibility of the appointed owner to ensure that their data and systems have appropriate security arrangements. System owners may delegate routine security responsibilities...