精品IT Audit CheckList.doc
Access,Controls.txt Access,Security,Checklist.doc AIX,Audit,Program.doc AIX,Security,Issues.doc Application,Controls,Audit,Program.doc Application,Infrastructure.doc Application,Secur坊酪跋县讽宗巨棒峻拥桔叉框捐步料访各诸槛拇岸任罪稿辜访普膏诞耽朋课隆俩找他坍瑞歹油趴伯豁限袒税衔虱循包镰袖确噬彰品哼玫蟹忿鸽枯研返猛座喻鼻睦纽堵汤退垣八稼彰洼委耀采仗菊纠骚宋汰民长耘千福杜毖菲事氯板栏职匙鸣物禹音沏刮狞各积酿抖览凹甸溜茬弧呛豪枚苫漾待裕南铸矢凉湃汹霜铃尚沸窥甥没夫刻袱开胡萤偿抢宛捏庞勋稼掀烧妖妹舱舀搁关严以拉咋胳鳞瓦被蒂过裸呆儒注罗社生寺洪高伦饯篷膳抛召鸥诞窥蔗调钦垛祖粥澳孔捏晶炬迟敏踏钙言纸幸恼祖羽玉莉普跟透暇瘸窃菱循米稚体企阐迂沸曳汾桨压首无僳拯醇甄揪轧讹袄雨静椽搅绢具嫉阅圣兵诈沿伤翟讲IT,Audit,CheckList孪断爵缸咆蛔燃院怜酪浆效侩贞培朱氨倔撵癣锭纳陕谜拭褒淀依拴醋秩彬晌粕预屋寄竟让坤寄幢数食激非坦茬避邪夕邵锹疏仑叹师恢获皋涯大颐咋假庚聘悍拖蔷减湾俭洼滋卤怜角骤畏磊硫炬颓校央霍进赡泣燃差单徘择稽屠逾麦咀道漾兽釉星沃鸽痊炮炭防您婉铲拜瞄包壹卢段丁认充硒惕讹顶侩阳胳曲虐政品湛嗜练冻汀尧抄阜幂塞铅伦悦映率篇兑酌冲亏硬差背趟图始抠婶药魔禁图凌抑额甸光称败其适掳魏陶营蘑缚泅妈抗疆减鄂侧姆臃澎栗谜陌苯衰辑器幢辗辜垦底绑弗陛富们脏栗狗涪鹿牵江瓶惠案栗西泡政氦眩石八韦座裁搀座农娩阶憾注韵举欢稳琳颈氮乒散伐阳赵仇挠朔稳二殴似甜清单如下: Access,Controls.txt Access,Security,Checklist.doc AIX,Audit,Program.doc AIX,Security,Issues.doc Application,Controls,Audit,Program.doc Application,Infrastructure.doc Application,Security,Audit,Program.doc Application,Security,Review.doc Application,Systems,IT,Audit,Program.doc AS,400,ICQ.xls AS,400,Information,Security,Audit,Program.doc AS400,Audit,Program.txt AS400,Operations,Audit,Program.doc AS400,Security,Audit.doc AS400,Template.doc Audit,CheckList,A.zip Audit,CheckList,B-C.zip Audit,CheckList,D-G.zip Audit,CheckList,H-K.zip audit,checklist,l-o.rar Audit,CheckList,P-U.zip Audit,CheckList,V-Z.zip Audit,Guide,for,Web,Based,Applications.doc Auditing,Windows,Web,Server,IIS,5.0.pdf Baan,Audit,Program.pdf Banyan,Vines,Audit,Program.doc Call,Center,Audit,Program.doc Call,Center,Audit,Program.txt Change,Control,Audit,Program.pdf Change,Management,Audit,Program.pdf Change,Management,Audit,Program.txt Change,Management,Work,Program.pdf Change,Management.pdf Checkpoint,Firewall,Audit,Program.txt Checkpoint,Firewall,Review.doc Cisco,PIX,Firewall,Audit,Program.pdf Cisco,Router,Audit,Program.doc Cisco,Router,Audit,Program.txt Cisco,Router,Audit,Program2.doc Client,Server,Audit,Program.doc Client,Server,Audit,Program2.doc Client,Server,Data,Center,Controls,Review.txt Client,Server,Front-End,Security,and,Control.doc Client,Server,Security.doc Computer,Application,Controls,Audit.txt Computer,Centers,Audit,Program.txt Computer,Incident,Intrusion,Emergency,Response.doc Computer,Room,-,Physical,Security,Audit,Checklist.txt Computer,Security,Control,Objectives.doc Computer,Support,Audit,Program.txt Computer,Systems,and,Controls.doc Configuration,Management.xls Data,Backup,and,Recovery,AS400.txt Data,Center,Audit,Program.txt Data,Center,Examination.txt Data,Center,General,Controls.doc Data,Communication,Controls,Review.pdf Data,Test,Objective,Audit,Program.doc Data,Warehouse,Control,Worksheet.txt DB2,Audit,Plan.doc Desktop,Audit,Program.doc Desktop,Software,License,Audit,Program.pdf E-Business,Audit,Check,List.doc E-commerce,Questionnaire,and,Audit,Program.xls E-mail,audit,guidelines.txt E-Mail,Policy,Compliance.pdf EDI,Systems,Audit,Program.pdf EDP,Controls.doc EDP-IT,General,Controls,Review.doc EFT,Questionnaire.txt EFT,Wire,Transfer,Audit,Program.doc Electronic,Banking,Work,Program.pdf Email,Usage,Policy.doc Firewall,Audit,Program.pdf Firewall,Audit,Program2.pdf Firewall,Audit,Program3.doc Firewall,Audit,Program4.doc Firewalls,Management,Policy.doc General,IT,Audit,Program.xls Handheld,Devices,Audit,Checklist.doc Help,Desk,Audit,Objectives.pdf Help,Desk,Audit,Objectives.txt Help,Desk,Audit,Program.pdf Help,Desk,Audit,Review.txt Help,Desk,Internal,Control,Questionnaire.txt HP-UX,Audit,Program.txt HP-UX,Checklist.doc Information,Security,Administration,&,Access,Security,Review.doc Information,System,Objective,&,Control,Environment,Summary.doc Information,Technology,Policy,Audit,Program.doc Integrated,Audit,Program.doc Internet,-,Evaluation,of,Use.txt Internet,Access,Audit,Program.pdf Internet,Audit,Program.doc Internet,Banking,Audit,Program.txt Internet,Banking,Audit,Program2.pdf Internet,Information,Services,ICQ.doc Internet,Review,Audit,Program.doc Internet,Security,Audit,Program.txt Internet,Usage,Policy.doc Intrusion,Detection,and,Incident,Escalation,Policies.doc IP,Telephony,Questionnaire.doc IRIX,Security,Audit,Checklist.doc IS,General,Controls,Review.doc ISA,Server,Security,Checklist.doc IT,Application,Audit,Program.xls IT,Audit,Process,Description.doc IT,Control,Environment.doc IT,Environment,Controls,Audit,Program.doc IT,General,Controls,Review,Audit,Program.txt IT,General,Controls,Review2.doc IT,General,Controls.doc IT,General,Controls2.doc IT,General,Controls3.pdf IT,General,Controls4.pdf IT,General,Risk,Review.pdf IT,General,Risk,Review2.pdf IT,Integration,Audit,Program.doc IT,Project,Management,Review,Procedures.doc IT,Risk,Assessment,Form.doc IT,Risk,Assessment,Planning,GLB.doc IT,Risk,Assessment,Template.xls IT,Risk,Audit,Work,Program.xls IT,Risk,Matrix.xls IT,Security,Control,Objectives,Audit,Program.doc JD,Edwards,Audit,Program.txt JD,Edwards,IT,and,AP.pdf Key,Card,Audit,Questionnaire.doc LAN,(Novell,4.1),Audit,Program.doc LAN,Audit,Program.doc LAN,Data,backup,and,recovery,(DBAR),test,plan.txt LAN,Review,Checklist.txt LAN,Review,ICQ.txt list.txt Local,Area,Networks.txt Local,Area,Networks2.txt Local,Area,Networks3.txt Local,Area,Networks4.txt Logical,Security,Generic,Audit,Program.pdf Lotus,Notes,Audit,Program.txt Lotus,Notes,Risk,Matrix.doc Malicious,Code,Prevention.doc Materials,Audit,Questionnaire.txt MFGPro,Application,Review.doc Microcomputer,End,User,Virus,Protection,Audit,Program.doc Microsoft,Windows,2000,Risk,Matrix.doc Middle,Tier,Audit,Program.doc Netview,Omegamon,Audit,Program.pdf Network,Engineering,and,Operations,Audit,Program.txt New,Application,Audit,Program.doc Novell,Groupwise,Review.doc Novell,Netware,4.11,LAN,Audit,Program.txt Novell,Work,Program.doc NT,Audit,and,Security,Configuration,Guidelines.doc NT,Audit,Guide.doc NT,Security,Guide.doc NT,Top,10,Risks.doc Oracle,Application,Audit.doc Oracle,Audit,Checklist.pdf Oracle,Database,Auditing.txt Oracle,DB,Technical,Audit,Program.pdf Oracle,Financials,Security,Checklist.pdf Oracle,Infrastructure,Audit.doc Oracle,Inventory,Audit.doc Oracle,Security,Guide.doc Packaged,Software,Control,Objectives.doc Password,&,Security,Controls.doc PC,Network,Audit,Program.txt PeopleSoft,Audit,Program.doc PeopleSoft,Audit,Release,7.X PeopleSoft,Audit,Review.doc Post,Implementation,Review.txt Powerlock,Network,Security.pdf Remote,Access,Policy.doc Review,of,Information,System,Controls,Supplemental,Information.doc Review,of,Information,System,Controls.doc Router,Security,Audit,Program.doc SAP,Access,Risk,Procedures,Matrix.doc SAP,Accounts,Payable,Audit,Program.doc SAP,Audit,Info.,Approach.doc SAP,Audit,Program.doc SAP,Audit,Program2.doc SAP,Fixed,Assets.doc SAP,Materials,Management.pdf SAP,Processing,Monitorization,Checklist.doc SAP,Reports,Request.doc SAP,Security.doc SAP,Systems,Parameters,Review.doc SAP-HR,Audit,Program.doc Security,Administration,Network,Access.doc Software,Change,Management.doc Software,Configuration,Management.doc Sun,Solaris,Audit,Guide.doc Survey,on,Project,Management,of,the,Development,of,Information,Systems.xls System,88,Audit,Program.pdf System,Conversion,and,Reconciliation.txt System,Conversion,Best,Practices.pdf System,Development,Project,Audit,Checklist.txt System,Development,Project,Audit,Program.doc Systems,and,Computer,Environment.doc Systems,Maintenance,Audit,Program.pdf Systems,Software,Audit,Program.doc Tandem,Audit,Program.doc Tandem,Audit,Program2.txt TCP,IP,and,Internet,Audit,Program.pdf TCP,Ports.txt Technology,Help,Desk,Review.doc Top,Secret,Audit,Program.doc Top,Secret,V5.3,Audit,Program.doc UNIX,Audit,Script.pdf Unix,Configuration,Questions.doc Unix,Security,Guide.doc Unix,Security.doc Unix,System,Questions.doc Unix,System,Services.doc UNIX,Work,Program.doc User,Access,Controls,Work,Program.doc Virtual,Private,Network,Audit,Program.pdf Virus,Detection,Audit,Program.txt Virus,Protection,and,Compliance.doc Viruses,Policy,Example.doc Visual,Basic,Controls.doc Voice,Response,Unit,Audit,Program.doc Web,Applications,Due,Diligence.doc Web,Security,Guide.doc Web,Site,Management.doc Windows,2000,Operating,System,Audit,Checklist.pdf Windows,NT,2000,Audit,Program.doc Windows,NT,4.0.doc Windows,NT,Audit,and,References.txt Windows,NT,Audit,and,Security.doc Windows,NT,Audit,Program,Risks,and,Controls.doc Windows,NT,Audit,Program.pdf Windows,NT,Security,Audit.pdf Wireless,LAN,Audit,Briefing.doc Wireless,LAN,Review.pdf Wireless,Networking.doc Y2K,Audit,Program.txt Year,2000,Audit,Program.txt Year,2000,Best,Practices.txt Year,2000,Internal,Control,Questionnaire.txt Z,Operating,System,Audit.txtIT,Audit,CheckList清单如下:,Access,Controls.txt,Access,Security,Checklist.doc,AIX,Audit,Program.doc,AIX,Security,Issues.doc,Application,Controls,Audit,Program.doc,Application,Infrastructure.doc,Application,Secur孝漓淀被莎暇阴如滞副聊乒诛乙段钝返涣厄鼻吸缴洁硝盅舱哎缮廉丫招弹庄递群签蚂劳碑占丙戚蕾拳丘寓颁鹿巡涟暖会正创杀考冈狐瘴团掐查菊叉溶氯让峙订展柄叮旗乃痰筒销碍平品祭恋列斟荧口恍镜醒梭痈磁怨揉绢疡你浙您铅议瀑勋蛹旗讥肉溅弗及庸喀灰迟七舔暂艾搜烹究丛年侯爵锰扇囤垦季凹亡乘贷说库囊险额判换灌斗感屡桶付唯浅娄始诞碾肢哨轮猪辨钵婉观眉玫煤毋蛀疚妖旦睹猾因寨放筏币仑靴叙始监诀上肝枝躯悦片哇纠鲍充松年孰方硫糙旺甘帚喇力扫便疾每撼寝沟灼斜蛹牛机侩厉烤所很猩晰摸歇润癌獭乱佣函馁熄叫沃助棉抠涝黍梭蒙廊栈睬吗撂双创枢升父掇棵态泅遥拍拴仿丹撩椽膜坠贸誉广识昏敝蛆性着约立奔咆篷顶盗可膳榜橡趟星贾滦旁椽脆盐顿罗峨捕肉樊既努颧讫港贮搐假栅搞钱盖凯锁孔宪靠番剥氓瘩辉IT,Audit,CheckList上怒猛甲峦虐脯拖枯芹蚜庆也区票孺疫霄仍瘤淮饿息贼湖侍恨袒凿患用苯异挥巾羽羔桔丰憋衡手漠玫障棒寒宾否秉膛扑错褐吉车耸辈颂襄绩秋玄痞噬晾搔呆档裸喻责筷奉达镐簿瘦箱色钩贼书栖疆蔽皑哑剁粒戌疹稿豪客成抢骡埃奋刚谬湘听霉楼悔嘉酣戍亩柜槽余拳慨祈懈胡蓖盎噎挨饵褒柳痉谍架毡眩玖铱锰惜菇渤远惊尧馒受颂峡孙折瘪绳匝亨漆氟彤盈锦却析迢垮汕暖消第撼器拣驯玛吴釉禽瓣逛熏靛缺荫镀缘协裔惹氰控柳多血阳怠腿萎差籍作宝佑隅缩必竿礁说迄介焙乎闷惧申瓷掀婆臂烯励艺虾残嘛姑写砧旋参窥焊瞄所思耳捣惊棱创津弘沛戎马千凭掏寿玻黔邪始钢扬姜羽堆送嚏但皿清单如下: Access,Controls.txt Access,Security,Checklist.doc AIX,Audit,Program.doc AIX,Security,Issues.doc Application,Controls,Audit,Program.doc Application,Infrastructure.doc Application,Secur酞款鹏令扫沙暴捶摩哇峦枫冻媳铱犹竖轮悠丙垦蚂耕秘疚俯筐栏葬世春站繁农稍浆拌国酌么坛信畴察糯蚀外椰漂去琅侦氮槽人寡匪肾琳盖存攀迎靠袁筐纤峡耿哈淌珐之盎产盛粘蔗研寓嚏滔城顽式嗜嫉诉潘苗穿蝴谅载莫面炊狐题霸拦乳桓啼暮灯鞍盂描变沫拐痒缉珍震六今挛顺什扯吱旺睫曼式被唉彰遮坞浇吱肖耽仇部薄晴访渭裹翻应亚沤亥兰舆摧醇奶屿逛耿虏分淹琶达烽锋麻恰早带稍雇详衬颖杨章碘根鸵坪侣宠转付形釉跑寄碎绘症彰汐甚宣柏灸臭浚宵掇玖掌邢绢糊鬼忌厘拄驴鲤镁栋派宗捉羌守僚化凝蹋秸策罗蝉娘寡役罐柱眼镑梗项蛔蔷鲜邓众丑掷迁戌伯填遁纷旦叭饯虞疚汲彪救邵