journal header

Volume 1, 2018

This Week's Online-Exclusive Feature

Toward Encrypted and Private Databases

Toward Encrypted and Private Databases
17 January 2018
Josh Joy

The number of data breaches annually totals thousands in the United States alone. More importantly, the total number of records exposed has reached the billions. The average cost of a data breach to a single enterprise is now averaging US $3.6 million per incident.

While the frequency of incidents has been on the rise, the impact to people is, unfortunately, increasing in severity. The most recent incident was the Equifax breach, in which 143 million Americans’ Social Security numbers, background information, birth dates, and even driver’s license numbers and credit card numbers were accessed. While debates ensue regarding the use of Social Security numbers as identification, the issue that can be immediately addressed today is the protection of databases by encrypting data. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Blog

Ian CookePrepare Your Substitutes
22 January 2018
Ian Cooke, CISA, CRISC, CGEIT, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt

According to Merriam-Webster, the first known use of the word backup was in 1910, and it has 3 distinct definitions. Not surprisingly, the last of these is the one that an ISACA audience will be most familiar with:  “A copy of computer data (such as a file or the contents of a hard drive.)” However, if I paid attention correctly in English class, I believe I am correct in saying that this definition would have been derived from the first definition, “one that serves as a substitute or support.”

Now consider a situation in which you are the manager of a soccer team that is performing very well in a crucial game because you have the best player in the world, Lionel Messi, playing for your team. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Backup and Recovery

Auditing Mobile Devices

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7

Data Management Body of Knowledge—A Summary for Auditors

 

Full Journal Issues

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Volume 2, 2016 Project Management: Methodologies and Associated Risk