Audit informatique — L audit informatique (en anglais Information technology audit ou IT audit) a pour objectif de s assurer que les activités informatiques d une entreprise ou d une administration se déroulent conformément aux règles et aux usages professionnels,… … Wikipédia en Français
Defense Contract Audit Agency — The Defense Contract Audit Agency (DCAA), under the authority, direction, and control of the United States Under Secretary of Defense (Comptroller), is responsible for performing all contract audits for the United States Department of Defense… … Wikipedia
Database audit — Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to… … Wikipedia
Consensus audit guidelines — The Twenty Critical Security Controls for Effective Cyber Defense (commonly called the Consensus Audit Guidelines or CAG) is a publication of best practice guidelines for computer security. The project was initiated early in 2008 as a response to … Wikipedia
Computer Aided Audit Tools — Computer Assisted Audit Techniques or Computer Aided Audit Tools (CAATS), also known as Computer Assisted Audit Tools and Techniques (CAATTs), is a growing field within the Financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Computer-aided audit tools — Computer assisted audit techniques or computer aided audit tools (CAATS), also known as computer assisted audit tools and techniques (CAATTs), is a growing field within the financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Information Systems Audit and Control Association — Website: www.isaca.org ISACA is an international professional association that deals with IT Governance. It is an affiliate member of IFAC.[1] Previously known as the Information Systems Audit and Control Association, ISACA now goes by its… … Wikipedia
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Data migration — is the process of transferring data between storage types, formats, or computer systems. Data migration is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. It is required when… … Wikipedia
Dynamic Business Modeling — ( DBM ) describes the ability to automate business models within an open framework. The independent analyst firm Gartner has recently called Dynamic Business Modeling critical for BSS solutions to succeed . Dynamic Business Modeling is based on… … Wikipedia