Page 69 - ITGC_Audit Guides
P. 69
Appendix H. References and Additional
Reading
References
Hall, Kaerrie. “Customer Data Quality: The Good, the Bad, and the Ugly.” Validity. September 5,
2019. https://www.validity.com/blog/customer-data-quality/.
Mell, Peter and Tim Grance, “The NIST Definition of Cloud Computing,” NIST Information
Technology Laboratory, Computer Security Resource Center, SP 800-145, September 2011.
https://csrc.nist.gov/publications/detail/sp/800-145/final.
Additional Reading
Center for Internet Security, https://www.cisecurity.org.
Cloud Security Alliance, https://cloudsecurityalliance.org.
Downing, Douglas, Michael Covington, Ph.D., Melody Covington, Catherine Anne Barrett, and
Sharon Covington. Dictionary of Computer and Internet Terms, Twelfth Edition. Hauppauge,
NY: B.E.S. Publishing, 2017. https://www.simonandschuster.com/books/-Dictionary-of-
Computer-and-Internet-Terms/Douglas-Downing/Barrons-Business-
Dictionaries/9781438008783.
Gibbs, Nelson, Divakar Jain, Amitesh Joshi, Surekha Muddamsetti, and Sarabjot Singh. A New
Auditor's Guide to Planning, Performing, and Presenting IT Audits. Altamonte Springs, FL:
The Interal Audit Foundation, 2010. https://bookstore.theiia.org/a-new-auditors-guide-to-
planning-performing-and-presenting-it-audits.
ISACA, https://www.isaca.org.
National Institute of Standards and Technology (NIST), https://www.nist.gov.
Rai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices:
Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Boca Raton,
FL: CRC Press, 2016. https://bookstore.theiia.org/security-and-auditing-of-smart-devices-
managing-proliferation-of-confidential-data-on-corporate-and-byod-devices.
Sigler, Ken and Dr. James L. Rainey III. Securing an IT Organization through Governance, Risk
Management, and Audit. Boca Raton, FL: CRC Press, 2015.
61 — theiia.org