Loading...
Please wait, while we are loading the content...
Similar Documents
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
| Content Provider | Semantic Scholar |
|---|---|
| Author | Brewer, Dennis C. |
| Copyright Year | 2005 |
| Abstract | About the Author.Acknowledgments.Introduction.Chapter 1: The Role of Information Technology Architecture in Information Systems Design.Chapter 2: Understanding Basic Concepts of Privacy and Data Protection.Chapter 3: Defining and Enforcing Architecture.Chapter 4: Combining External Forces, Internal Influences, and IT Assets.Chapter 5: Simplifying the Security Matrix.Chapter 6: Developing Directory-Based Access Control Strategies.Chapter 7: Integrating the Critical Elements.Chapter 8: Engineering Privacy Protection into Systems and Applications.Chapter 9: The Value of Data Inventory and Data Labeling.Chapter 10: Putting It All Together in the Web Applications Environment.Chapter 11: Why Federated Identity Schemes Fail.Chapter 12: A Pathway to Universal Two-Factor Authentication.Appendix A: WWW Resources for Authentication, Authorization, and Access Control News and Information.Appendix B: Important Access Control and Security Terms.Appendix C: Critical Success Factors for Controls Design.Appendix D: Sample Policy Statements for Compulsory Access and Security Controls.Appendix E: Documentation Examples.Appendix F: Sample Job Description for Directory Engineer/Schema Architect.Index. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://englishpdflib.info/security-controls-for-sarbanes-oxley-section-404-it-compliance-authorization-authentication-and-a-hand-picked-collection-dennis-c-brewer.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |