THE IMPORTANCE OF CYBER SECURITY RISKS IN AUDIT OF INFORMATION SYSTEMS IN BUSINESSES

Author:

AKIN Serkan1,TANÇ Ahmet2

Affiliation:

1. KAYSERİ ÜNİVERSİTESİ, PINARBAŞI MESLEK YÜKSEKOKULU

2. NEVSEHIR HACI BEKTAS VELI UNIVERSITY

Abstract

Information systems; It has been an important factor in reducing costs, facilitating operations and saving time for businesses in the constantly developing and changing information age. Information systems, which provide convenience to businesses in many areas, are also seen to be an important risk factor. Many standards have been published for information security, which is of vital importance for some sectors such as banking, and it is clear that it is an important and important issue for all businesses. The necessity of designing information security not only against external risks, but also against all internal and external risks is demonstrated by the studies carried out. Cyber security risks, especially in this area, are considered as important risks that threaten information systems and may cause both financial and corporate reputation losses if adequate precautions are not taken. In this study, firstly, the concepts of information and information systems are explained, and then cyber security risks in information systems audit are explained, and some suggestions are made regarding the need to avoid related risks for businesses and those who perform business audits.

Publisher

Erciyes Universitesi

Reference40 articles.

1. Aktaş, F. Ö., & Soğukpınar, İ. (2010). Bilgi güvenliğinde uygun risk analizi ve yönetimi yönteminin seçimi için bir yaklaşım. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi, 3(1), 39-46.

2. Bilgiç, E., Sadıkoğlu, E., & Turhan, S. (2013). TS EN ISO/IEC 17025 Standardı Denetimlerinde Teknik Alanda Tespit Edilen Genel Bulgular. Mühendis ve Makina, 14-17.

3. Cantürk, S. (2013). Bilgi Teknolojileri Yönetişimi İçin Yeni Bir Adım: COBIT 5. KPMG Gündem Dergisi, 17, 36-37.

4. Chen, T., & Walsh, P. J., (2009). Guarding against network intrusions. Vacca, J. R. (Ed.) Computer and Information Security Handbook (ss. 53-66). Morgan Kaufmann Publishers

5. Center for Audit Quality. (2019). Understanding Cybersecurity and the External Audit, Center for Audit Quality. https://www.thecaq.org/wp-content/uploads/2019/03/cybersecurity_and_external_audit_final.pdf

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3