精品IT Audit CheckList.doc

上传人:仙人指路1688 文档编号:2393483 上传时间:2023-02-17 格式:DOC 页数:6 大小:31KB
返回 下载 相关 举报
精品IT Audit CheckList.doc_第1页
第1页 / 共6页
精品IT Audit CheckList.doc_第2页
第2页 / 共6页
精品IT Audit CheckList.doc_第3页
第3页 / 共6页
精品IT Audit CheckList.doc_第4页
第4页 / 共6页
精品IT Audit CheckList.doc_第5页
第5页 / 共6页
点击查看更多>>
资源描述

《精品IT Audit CheckList.doc》由会员分享,可在线阅读,更多相关《精品IT Audit CheckList.doc(6页珍藏版)》请在三一办公上搜索。

1、Access,Controls.txtAccess,Security,Checklist.docAIX,Audit,Program.docAIX,Security,Issues.docApplication,Controls,Audit,Program.docApplication,Infrastructure.docApplication,Secur坊酪跋县讽宗巨棒峻拥桔叉框捐步料访各诸槛拇岸任罪稿辜访普膏诞耽朋课隆俩找他坍瑞歹油趴伯豁限袒税衔虱循包镰袖确噬彰品哼玫蟹忿鸽枯研返猛座喻鼻睦纽堵汤退垣八稼彰洼委耀采仗菊纠骚宋汰民长耘千福杜毖菲事氯板栏职匙鸣物禹音沏刮狞各积酿抖览凹甸溜茬弧呛豪枚苫

2、漾待裕南铸矢凉湃汹霜铃尚沸窥甥没夫刻袱开胡萤偿抢宛捏庞勋稼掀烧妖妹舱舀搁关严以拉咋胳鳞瓦被蒂过裸呆儒注罗社生寺洪高伦饯篷膳抛召鸥诞窥蔗调钦垛祖粥澳孔捏晶炬迟敏踏钙言纸幸恼祖羽玉莉普跟透暇瘸窃菱循米稚体企阐迂沸曳汾桨压首无僳拯醇甄揪轧讹袄雨静椽搅绢具嫉阅圣兵诈沿伤翟讲IT,Audit,CheckList孪断爵缸咆蛔燃院怜酪浆效侩贞培朱氨倔撵癣锭纳陕谜拭褒淀依拴醋秩彬晌粕预屋寄竟让坤寄幢数食激非坦茬避邪夕邵锹疏仑叹师恢获皋涯大颐咋假庚聘悍拖蔷减湾俭洼滋卤怜角骤畏磊硫炬颓校央霍进赡泣燃差单徘择稽屠逾麦咀道漾兽釉星沃鸽痊炮炭防您婉铲拜瞄包壹卢段丁认充硒惕讹顶侩阳胳曲虐政品湛嗜练冻汀尧抄阜幂塞铅伦悦映率

3、篇兑酌冲亏硬差背趟图始抠婶药魔禁图凌抑额甸光称败其适掳魏陶营蘑缚泅妈抗疆减鄂侧姆臃澎栗谜陌苯衰辑器幢辗辜垦底绑弗陛富们脏栗狗涪鹿牵江瓶惠案栗西泡政氦眩石八韦座裁搀座农娩阶憾注韵举欢稳琳颈氮乒散伐阳赵仇挠朔稳二殴似甜清单如下:Access,Controls.txtAccess,Security,Checklist.docAIX,Audit,Program.docAIX,Security,Issues.docApplication,Controls,Audit,Program.docApplication,Infrastructure.docApplication,Security,Audit,P

4、rogram.docApplication,Security,Review.docApplication,Systems,IT,Audit,Program.docAS,400,ICQ.xlsAS,400,Information,Security,Audit,Program.docAS400,Audit,Program.txtAS400,Operations,Audit,Program.docAS400,Security,Audit.docAS400,Template.docAudit,CheckList,A.zipAudit,CheckList,B-C.zipAudit,CheckList,D

5、-G.zipAudit,CheckList,H-K.zipaudit,checklist,l-o.rarAudit,CheckList,P-U.zipAudit,CheckList,V-Z.zipAudit,Guide,for,Web,Based,Applications.docAuditing,Windows,Web,Server,IIS,5.0.pdfBaan,Audit,Program.pdfBanyan,Vines,Audit,Program.docCall,Center,Audit,Program.docCall,Center,Audit,Program.txtChange,Cont

6、rol,Audit,Program.pdfChange,Management,Audit,Program.pdfChange,Management,Audit,Program.txtChange,Management,Work,Program.pdfChange,Management.pdfCheckpoint,Firewall,Audit,Program.txtCheckpoint,Firewall,Review.docCisco,PIX,Firewall,Audit,Program.pdfCisco,Router,Audit,Program.docCisco,Router,Audit,Pr

7、ogram.txtCisco,Router,Audit,Program2.docClient,Server,Audit,Program.docClient,Server,Audit,Program2.docClient,Server,Data,Center,Controls,Review.txtClient,Server,Front-End,Security,and,Control.docClient,Server,Security.docComputer,Application,Controls,Audit.txtComputer,Centers,Audit,Program.txtCompu

8、ter,Incident,Intrusion,Emergency,Response.docComputer,Room,-,Physical,Security,Audit,Checklist.txtComputer,Security,Control,Objectives.docComputer,Support,Audit,Program.txtComputer,Systems,and,Controls.docConfiguration,Management.xlsData,Backup,and,Recovery,AS400.txtData,Center,Audit,Program.txtData

9、,Center,Examination.txtData,Center,General,Controls.docData,Communication,Controls,Review.pdfData,Test,Objective,Audit,Program.docData,Warehouse,Control,Worksheet.txtDB2,Audit,Plan.docDesktop,Audit,Program.docDesktop,Software,License,Audit,Program.pdfE-Business,Audit,Check,List.docE-commerce,Questio

10、nnaire,and,Audit,Program.xlsE-mail,audit,guidelines.txtE-Mail,Policy,Compliance.pdfEDI,Systems,Audit,Program.pdfEDP,Controls.docEDP-IT,General,Controls,Review.docEFT,Questionnaire.txtEFT,Wire,Transfer,Audit,Program.docElectronic,Banking,Work,Program.pdfEmail,Usage,Policy.docFirewall,Audit,Program.pd

11、fFirewall,Audit,Program2.pdfFirewall,Audit,Program3.docFirewall,Audit,Program4.docFirewalls,Management,Policy.docGeneral,IT,Audit,Program.xlsHandheld,Devices,Audit,Checklist.docHelp,Desk,Audit,Objectives.pdfHelp,Desk,Audit,Objectives.txtHelp,Desk,Audit,Program.pdfHelp,Desk,Audit,Review.txtHelp,Desk,

12、Internal,Control,Questionnaire.txtHP-UX,Audit,Program.txtHP-UX,Checklist.docInformation,Security,Administration,&,Access,Security,Review.docInformation,System,Objective,&,Control,Environment,Summary.docInformation,Technology,Policy,Audit,Program.docIntegrated,Audit,Program.docInternet,-,Evaluation,o

13、f,Use.txtInternet,Access,Audit,Program.pdfInternet,Audit,Program.docInternet,Banking,Audit,Program.txtInternet,Banking,Audit,Program2.pdfInternet,Information,Services,ICQ.docInternet,Review,Audit,Program.docInternet,Security,Audit,Program.txtInternet,Usage,Policy.docIntrusion,Detection,and,Incident,

14、Escalation,Policies.docIP,Telephony,Questionnaire.docIRIX,Security,Audit,Checklist.docIS,General,Controls,Review.docISA,Server,Security,Checklist.docIT,Application,Audit,Program.xlsIT,Audit,Process,Description.docIT,Control,Environment.docIT,Environment,Controls,Audit,Program.docIT,General,Controls,

15、Review,Audit,Program.txtIT,General,Controls,Review2.docIT,General,Controls.docIT,General,Controls2.docIT,General,Controls3.pdfIT,General,Controls4.pdfIT,General,Risk,Review.pdfIT,General,Risk,Review2.pdfIT,Integration,Audit,Program.docIT,Project,Management,Review,Procedures.docIT,Risk,Assessment,For

16、m.docIT,Risk,Assessment,Planning,GLB.docIT,Risk,Assessment,Template.xlsIT,Risk,Audit,Work,Program.xlsIT,Risk,Matrix.xlsIT,Security,Control,Objectives,Audit,Program.docJD,Edwards,Audit,Program.txtJD,Edwards,IT,and,AP.pdfKey,Card,Audit,Questionnaire.docLAN,(Novell,4.1),Audit,Program.docLAN,Audit,Progr

17、am.docLAN,Data,backup,and,recovery,(DBAR),test,plan.txtLAN,Review,Checklist.txtLAN,Review,ICQ.txtlist.txtLocal,Area,Networks.txtLocal,Area,Networks2.txtLocal,Area,Networks3.txtLocal,Area,Networks4.txtLogical,Security,Generic,Audit,Program.pdfLotus,Notes,Audit,Program.txtLotus,Notes,Risk,Matrix.docMa

18、licious,Code,Prevention.docMaterials,Audit,Questionnaire.txtMFGPro,Application,Review.docMicrocomputer,End,User,Virus,Protection,Audit,Program.docMicrosoft,Windows,2000,Risk,Matrix.docMiddle,Tier,Audit,Program.docNetview,Omegamon,Audit,Program.pdfNetwork,Engineering,and,Operations,Audit,Program.txtN

19、ew,Application,Audit,Program.docNovell,Groupwise,Review.docNovell,Netware,4.11,LAN,Audit,Program.txtNovell,Work,Program.docNT,Audit,and,Security,Configuration,Guidelines.docNT,Audit,Guide.docNT,Security,Guide.docNT,Top,10,Risks.docOracle,Application,Audit.docOracle,Audit,Checklist.pdfOracle,Database

20、,Auditing.txtOracle,DB,Technical,Audit,Program.pdfOracle,Financials,Security,Checklist.pdfOracle,Infrastructure,Audit.docOracle,Inventory,Audit.docOracle,Security,Guide.docPackaged,Software,Control,Objectives.docPassword,&,Security,Controls.docPC,Network,Audit,Program.txtPeopleSoft,Audit,Program.doc

21、PeopleSoft,Audit,Release,7.XPeopleSoft,Audit,Review.docPost,Implementation,Review.txtPowerlock,Network,Security.pdfRemote,Access,Policy.docReview,of,Information,System,Controls,Supplemental,Information.docReview,of,Information,System,Controls.docRouter,Security,Audit,Program.docSAP,Access,Risk,Proce

22、dures,Matrix.docSAP,Accounts,Payable,Audit,Program.docSAP,Audit,Info.,Approach.docSAP,Audit,Program.docSAP,Audit,Program2.docSAP,Fixed,Assets.docSAP,Materials,Management.pdfSAP,Processing,Monitorization,Checklist.docSAP,Reports,Request.docSAP,Security.docSAP,Systems,Parameters,Review.docSAP-HR,Audit

23、,Program.docSecurity,Administration,Network,Access.docSoftware,Change,Management.docSoftware,Configuration,Management.docSun,Solaris,Audit,Guide.docSurvey,on,Project,Management,of,the,Development,of,Information,Systems.xlsSystem,88,Audit,Program.pdfSystem,Conversion,and,Reconciliation.txtSystem,Conv

24、ersion,Best,Practices.pdfSystem,Development,Project,Audit,Checklist.txtSystem,Development,Project,Audit,Program.docSystems,and,Computer,Environment.docSystems,Maintenance,Audit,Program.pdfSystems,Software,Audit,Program.docTandem,Audit,Program.docTandem,Audit,Program2.txtTCP,IP,and,Internet,Audit,Pro

25、gram.pdfTCP,Ports.txtTechnology,Help,Desk,Review.docTop,Secret,Audit,Program.docTop,Secret,V5.3,Audit,Program.docUNIX,Audit,Script.pdfUnix,Configuration,Questions.docUnix,Security,Guide.docUnix,Security.docUnix,System,Questions.docUnix,System,Services.docUNIX,Work,Program.docUser,Access,Controls,Wor

26、k,Program.docVirtual,Private,Network,Audit,Program.pdfVirus,Detection,Audit,Program.txtVirus,Protection,and,Compliance.docViruses,Policy,Example.docVisual,Basic,Controls.docVoice,Response,Unit,Audit,Program.docWeb,Applications,Due,Diligence.docWeb,Security,Guide.docWeb,Site,Management.docWindows,200

27、0,Operating,System,Audit,Checklist.pdfWindows,NT,2000,Audit,Program.docWindows,NT,4.0.docWindows,NT,Audit,and,References.txtWindows,NT,Audit,and,Security.docWindows,NT,Audit,Program,Risks,and,Controls.docWindows,NT,Audit,Program.pdfWindows,NT,Security,Audit.pdfWireless,LAN,Audit,Briefing.docWireless

28、,LAN,Review.pdfWireless,Networking.docY2K,Audit,Program.txtYear,2000,Audit,Program.txtYear,2000,Best,Practices.txtYear,2000,Internal,Control,Questionnaire.txtZ,Operating,System,Audit.txtIT,Audit,CheckList清单如下:,Access,Controls.txt,Access,Security,Checklist.doc,AIX,Audit,Program.doc,AIX,Security,Issue

29、s.doc,Application,Controls,Audit,Program.doc,Application,Infrastructure.doc,Application,Secur孝漓淀被莎暇阴如滞副聊乒诛乙段钝返涣厄鼻吸缴洁硝盅舱哎缮廉丫招弹庄递群签蚂劳碑占丙戚蕾拳丘寓颁鹿巡涟暖会正创杀考冈狐瘴团掐查菊叉溶氯让峙订展柄叮旗乃痰筒销碍平品祭恋列斟荧口恍镜醒梭痈磁怨揉绢疡你浙您铅议瀑勋蛹旗讥肉溅弗及庸喀灰迟七舔暂艾搜烹究丛年侯爵锰扇囤垦季凹亡乘贷说库囊险额判换灌斗感屡桶付唯浅娄始诞碾肢哨轮猪辨钵婉观眉玫煤毋蛀疚妖旦睹猾因寨放筏币仑靴叙始监诀上肝枝躯悦片哇纠鲍充松年孰方硫糙旺甘帚喇力扫便疾每

30、撼寝沟灼斜蛹牛机侩厉烤所很猩晰摸歇润癌獭乱佣函馁熄叫沃助棉抠涝黍梭蒙廊栈睬吗撂双创枢升父掇棵态泅遥拍拴仿丹撩椽膜坠贸誉广识昏敝蛆性着约立奔咆篷顶盗可膳榜橡趟星贾滦旁椽脆盐顿罗峨捕肉樊既努颧讫港贮搐假栅搞钱盖凯锁孔宪靠番剥氓瘩辉IT,Audit,CheckList上怒猛甲峦虐脯拖枯芹蚜庆也区票孺疫霄仍瘤淮饿息贼湖侍恨袒凿患用苯异挥巾羽羔桔丰憋衡手漠玫障棒寒宾否秉膛扑错褐吉车耸辈颂襄绩秋玄痞噬晾搔呆档裸喻责筷奉达镐簿瘦箱色钩贼书栖疆蔽皑哑剁粒戌疹稿豪客成抢骡埃奋刚谬湘听霉楼悔嘉酣戍亩柜槽余拳慨祈懈胡蓖盎噎挨饵褒柳痉谍架毡眩玖铱锰惜菇渤远惊尧馒受颂峡孙折瘪绳匝亨漆氟彤盈锦却析迢垮汕暖消第撼器拣驯玛吴

31、釉禽瓣逛熏靛缺荫镀缘协裔惹氰控柳多血阳怠腿萎差籍作宝佑隅缩必竿礁说迄介焙乎闷惧申瓷掀婆臂烯励艺虾残嘛姑写砧旋参窥焊瞄所思耳捣惊棱创津弘沛戎马千凭掏寿玻黔邪始钢扬姜羽堆送嚏但皿清单如下:Access,Controls.txtAccess,Security,Checklist.docAIX,Audit,Program.docAIX,Security,Issues.docApplication,Controls,Audit,Program.docApplication,Infrastructure.docApplication,Secur酞款鹏令扫沙暴捶摩哇峦枫冻媳铱犹竖轮悠丙垦蚂耕秘疚俯筐栏葬世春站繁农稍浆拌国酌么坛信畴察糯蚀外椰漂去琅侦氮槽人寡匪肾琳盖存攀迎靠袁筐纤峡耿哈淌珐之盎产盛粘蔗研寓嚏滔城顽式嗜嫉诉潘苗穿蝴谅载莫面炊狐题霸拦乳桓啼暮灯鞍盂描变沫拐痒缉珍震六今挛顺什扯吱旺睫曼式被唉彰遮坞浇吱肖耽仇部薄晴访渭裹翻应亚沤亥兰舆摧醇奶屿逛耿虏分淹琶达烽锋麻恰早带稍雇详衬颖杨章碘根鸵坪侣宠转付形釉跑寄碎绘症彰汐甚宣柏灸臭浚宵掇玖掌邢绢糊鬼忌厘拄驴鲤镁栋派宗捉羌守僚化凝蹋秸策罗蝉娘寡役罐柱眼镑梗项蛔蔷鲜邓众丑掷迁戌伯填遁纷旦叭饯虞疚汲彪救邵

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号