Logical Security: Application, Database, and Operating System Layers
-
A well-developed and implemented logical security management program is essential for most business processes and ensures logical data and information assets are properly protected from inappropriate access and unapproved data exfiltration.
Internal auditors need a basic understanding of logical security. Without this knowledge, internal auditors may not recognize excessive access, potential separation of duties (SoD), and other risks, and may lack the ability to assess or audit the design or effectiveness of logical access controls.
This course delivers an introduction to logical security concepts for applications, databases, and operating systems, and emphasizes the significant role logical security plays in protecting sensitive and confidential electronic data and information assets. Further, this course provides guidance for building proficiencies in logical security-related assurance services by describing the general IT competencies needed by today’s internal auditors.
Learning Objective(s):
Identify how application security controls relate to an IT audit.
Learn the fundamentals of how databases and database management systems operate.
Discuss high-level database security controls.
Describe common operating system controls.
ADVANCE PREPARATION: None
AUTHOR: IIA
AUDIO/VIDEO: N/A
CATEGORY: Technology
COMPETENCIES: Environment
COURSE EXPIRATION: 30
DELIVERY FORMAT(S): Self Study
FIELD(S) OF STUDY: Information Technology
PREREQUISITE(S): None
Course Offerings
-
On-demandAvailable Anytime
$59.00