Skip to Main Content

TIM-6370 v1

Week 1 Resources

Information Technology Control and Audit

Otero, A. R. (2019). Information technology control and audit (5th ed.). CRC Press.

Read Chapter 2

Chapter 2 covers the topics of IT crimes and explains what cyberattacks are along with examples of recent attacks.  These topics are beneficial for this week as it helps to lay the foundation understanding why legislation is relevant to IT and why we need to consider it in our network designs/controls.

The Redshelf book link is located in the Getting Started module of your course. Click on the link there to access your book. 

Auditing IT Infrastructures for Compliance

Weiss, M., & Solomon, M. G. (2016). Auditing IT infrastructures for compliance (2nd ed.). Jones & Bartlett Learning.

Read Chapters 1 and 2.

The readings from this textbook cover a lot of topics related to auditing IT infrastructures.  Chapter 1 dives into the critical topic of why there is a need for information system security compliance.  The chapter readings look at what an assessment is, IT security audits, and the importance of governance.  It briefly addresses the consequences of not complying with compliance laws which something all IT admins and business need to be aware of.  Chapter 2 dives a little deeper into U.S. Compliance laws.  The chapter defines and explains various laws we need to consider in our network infrastructures such as SOX and HIPAA.

The Redshelf book link is located in the Getting Started module of your course. Click on the link there to access your book.