Page 69 - ITGC_Audit Guides
P. 69

Appendix H. References and Additional

                   Reading





                   References


                   Hall, Kaerrie. “Customer Data Quality: The Good, the Bad, and the Ugly.” Validity. September 5,
                       2019. https://www.validity.com/blog/customer-data-quality/.
                   Mell, Peter and Tim Grance, “The NIST Definition of Cloud Computing,” NIST Information
                       Technology Laboratory, Computer Security Resource Center, SP 800-145, September 2011.
                       https://csrc.nist.gov/publications/detail/sp/800-145/final.

                   Additional Reading

                   Center for Internet Security, https://www.cisecurity.org.

                   Cloud Security Alliance, https://cloudsecurityalliance.org.
                   Downing, Douglas, Michael Covington, Ph.D., Melody Covington, Catherine Anne Barrett, and
                       Sharon Covington. Dictionary of Computer and Internet Terms, Twelfth Edition. Hauppauge,
                       NY: B.E.S. Publishing, 2017. https://www.simonandschuster.com/books/-Dictionary-of-
                       Computer-and-Internet-Terms/Douglas-Downing/Barrons-Business-
                       Dictionaries/9781438008783.
                   Gibbs, Nelson, Divakar Jain, Amitesh Joshi, Surekha Muddamsetti, and Sarabjot Singh. A New
                       Auditor's Guide to Planning, Performing, and Presenting IT Audits. Altamonte Springs, FL:
                       The Interal Audit Foundation, 2010. https://bookstore.theiia.org/a-new-auditors-guide-to-
                       planning-performing-and-presenting-it-audits.
                   ISACA, https://www.isaca.org.

                   National Institute of Standards and Technology (NIST), https://www.nist.gov.
                   Rai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices:
                       Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Boca Raton,
                       FL: CRC Press, 2016. https://bookstore.theiia.org/security-and-auditing-of-smart-devices-
                       managing-proliferation-of-confidential-data-on-corporate-and-byod-devices.

                   Sigler, Ken and Dr. James L. Rainey III. Securing an IT Organization through Governance, Risk
                       Management, and Audit. Boca Raton, FL: CRC Press, 2015.

















                   61 — theiia.org
   64   65   66   67   68   69   70   71   72   73   74