{"title":"IS audit checklist for router management performed by third-party","authors":"V. Mahnic, B. Klepec, N. Zabkar","doi":"10.1109/EURCON.2001.937801","DOIUrl":null,"url":null,"abstract":"Network management is an important part of business management. Router management is one component of network management. Because of its complexity, router management is often performed by a third-party. In this paper, the risks involved with such a solution are described as well as guide lines for establishing controls to mitigate these risks. Standard COBIT (control objectives for information technology) has been used for this purpose and the result has been presented in the form of an IS (information system) audit checklist. Elements of this checklist are described and conclusions given.","PeriodicalId":205662,"journal":{"name":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EURCON.2001.937801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Network management is an important part of business management. Router management is one component of network management. Because of its complexity, router management is often performed by a third-party. In this paper, the risks involved with such a solution are described as well as guide lines for establishing controls to mitigate these risks. Standard COBIT (control objectives for information technology) has been used for this purpose and the result has been presented in the form of an IS (information system) audit checklist. Elements of this checklist are described and conclusions given.