audit trail

(redirected from Information security)
Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Encyclopedia, Wikipedia.

Audit trail

Resolves the validity of an accounting entry by a step-by-step record by which accounting data can be traced to their source.

Audit Trail

A record of the transactions in a trade from the beginning to the end. The SEC and the NYSE use the audit trail when investigating irregularities and potential trading violations.

audit trail

A record of business transactions that can be used by an interested party to trace an organization's activities to original documents. Audit trails are used to verify account balances.

audit trail

a trail of primary documents such as INVOICES, and LEDGER entries, for example sales ledger records, which are used to identify how ACCOUNTING records have been kept. By selecting a sample of primary documents and ledger entries an AUDITOR can check the completeness and accuracy of a firm's accounting system.
References in periodicals archive ?
So far we have not yet found an open access Web-based case library that is designed specifically for the domain of information security education.
Today, there is no systematic cross-border cooperation on network and information security among member states, although security issues cannot be an isolated issue for one country alone.
ISC)2[R]] is the internationally recognized Gold Standard for certifying information security professionals.
ISO 17799 suggests developing a "cross-functional forum of management representatives from relevant parts of the organization" as a precursor to effectively implementing a company-wide information security management program.
Our experts throughout the world work hard to research and develop the most effective education programs and our highly trained instructors deliver these programs to our members and certification candidates to ensure they have the necessary tools to be effective information security professionals," said Marc Thompson, global business development for (ISC)2.
Information security professionals attending the 2007 RSA Conference can obtain a hard copy or CD version of the 2007 Resource Guide at various locations throughout the conference, including the (ISC)2 booth.
Zeitler has participated in several influential information security committees throughout his career, including the Los Angeles County Computer Crime Task Force, Department of the Treasury's Financial Management Services Security Advisory Panel, ANSI X9.
Prior to joining CACI, Brody served as vice president of information security for INPUT, where he was responsible for leading the consulting practice in the security field and contributing to the Federal Information Security Analysis program.
Among the most notable priorities is privacy and personal data protection, which is the one information security issue most-consumer driven.
David Drossman, Chief Information Security Officer, ITG Investment
The 10 domains, all of which will be covered in the (ISC)2CISSP CBK Review Seminar conducted by Rapid7, include: Information Security and Risk Management; Security Architecture and Design; Access Control; Application Security; Operations Security; Physical (Environmental) Security; Cryptography; Telecommunications and Network Security; Business Continuity and Disaster Recovery Planning; and Legal, Regulations Compliance and Investigations.
Nordic companies and organisations have during the last few years faced increasing threats to their information security for several reasons, such as enhanced connectivity, increased level of organised IT crime as well as increased reliance on online business and intellectual property rights.
Full browser ?