A Conceptual Framework of Information Security Database Audit and Assessment

Authors

  • Muneeb -ul-Hasan Faculty of Computing Universiti Teknologi Malaysia 81310 UTM Johor Bahru, Johor, Malaysia
  • Siti Hajar Othman Faculty of Computing Universiti Teknologi Malaysia 81310 UTM Johor Bahru, Johor, Malaysia
  • Marina Md Arshad Faculty of Computing Universiti Teknologi Malaysia 81310 UTM Johor Bahru, Johor, Malaysia

DOI:

https://doi.org/10.11113/ijic.v9n1.206

Keywords:

Information Security, Audit, Database Audit, Audit Quality

Abstract

Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.

Author Biography

Muneeb -ul-Hasan, Faculty of Computing Universiti Teknologi Malaysia 81310 UTM Johor Bahru, Johor, Malaysia

Computing

Downloads

Published

2019-05-31

How to Cite

-ul-Hasan, M., Othman, S. H., & Md Arshad, M. (2019). A Conceptual Framework of Information Security Database Audit and Assessment. International Journal of Innovative Computing, 9(1). https://doi.org/10.11113/ijic.v9n1.206

Issue

Section

Computer Science