When auditing the security architecture of an online application, an IS auditor should FIRST review the:
This is according to the ISACA's IS Auditing Guideline G15 on Security Awareness Training, which states that security awareness training should include 'an understanding of the types of suspicious activity and the appropriate response to them'.
Caitlin
1 days agoJames
17 days agoHenriette
18 days agoPenney
19 days agoHenriette
23 days ago