Romania

Romania
Author: International Monetary Fund. Monetary and Capital Markets Department
Publisher: International Monetary Fund
Total Pages: 253
Release: 2018-06-20
Genre: Business & Economics
ISBN: 1484361962

This paper discusses findings of the Detailed Assessment of Observance of the Basel Core Principles (BCP) for Effective Banking Supervision in Romania. The supervisory approach of the National Bank of Romania (NBR) has been changing toward a more risk based approach since the previous BCP assessment, but more needs to be done. Further development of the NBR’s supervisory approach will make supervision more effective and in line with the requirements of the 2012 BCP. The NBR may need to devote more supervisory attention to banks’ risk models and building up further expertise in specialized areas such as information technology and market risk. In the area of corrective actions and sanctions, the NBR should review its framework to ensure it is protected from undue legal challenges.

COBIT 5 for Risk

COBIT 5 for Risk
Author: ISACA
Publisher: ISACA
Total Pages: 246
Release: 2013-09-25
Genre: Technology & Engineering
ISBN: 1604204575

Information is a key resource for all enterprises. From the time information is created to the moment it is destroyed, technology plays a significant role in containing, distributing and analysing information. Technology is increasingly advanced and has become pervasive in enterprises and the social, public and business environments.

Enterprise Governance of Information Technology

Enterprise Governance of Information Technology
Author: Steven De Haes
Publisher: Springer
Total Pages: 178
Release: 2015-03-04
Genre: Business & Economics
ISBN: 3319145479

Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches. At the forefront of the field, the authors of this volume draw from years of research and advising corporate clients to present a comprehensive resource on enterprise governance of IT (EGIT). Information technology (IT) has become a crucial enabler in the support, sustainability and growth of enterprises. Given this pervasive role of IT, a specific focus on EGIT has arisen over the last two decades, as an integral part of corporate governance. Going well beyond the implementation of a superior IT infrastructure, enterprise governance of IT is about defining and embedding processes and structures throughout the organization that enable boards and business and IT people to execute their responsibilities in support of business/IT alignment and value creation from their IT-enabled investments. Featuring a variety of elements, including executive summaries and sidebars, extensive references and questions and activities (with additional materials available on-line), this book will be an essential resource for professionals, researchers and students alike

COBIT 5

COBIT 5
Author: Information Systems Audit and Control Association
Publisher: ISACA
Total Pages: 78
Release: 2012
Genre: Business enterprises
ISBN: 1604202386

Computational Science and Its Applications -- ICCSA 2015

Computational Science and Its Applications -- ICCSA 2015
Author: Osvaldo Gervasi
Publisher: Springer
Total Pages: 786
Release: 2015-06-18
Genre: Computers
ISBN: 3319214101

The five-volume set LNCS 9155-9159 constitutes the refereed proceedings of the 15th International Conference on Computational Science and Its Applications, ICCSA 2015, held in Banff, AB, Canada, in June 2015. The 232 revised full papers presented in 22 workshops and a general track were carefully reviewed and selected from 780 initial submissions for inclusion in this volume. They cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.

Auditing Business Continuity

Auditing Business Continuity
Author: Rolf von Roessing
Publisher: Rothstein Associates Inc
Total Pages: 308
Release: 2002
Genre: Business & Economics
ISBN: 9781931332156

This book not only provides a general outline of how to conduct different types of business continuity audits but also reinforces their application by providing practical examples and advice to illustrate the step-by-step methodology, including contracts, reports and techniques. The practical application of the methodology enables the professional auditor and BCM practitioner to identify and illustrate the use of good BCM practice whilst demonstrating added value and business resilience

Governance, Risk, and Compliance Handbook for Oracle Applications

Governance, Risk, and Compliance Handbook for Oracle Applications
Author: Nigel King
Publisher: Packt Publishing Ltd
Total Pages: 646
Release: 2012-08-24
Genre: Computers
ISBN: 1849681716

The book is not organized by product, rather by the governance and risk assurance processes. A given product may be represented in multiple places within the book and a given process may contain multiple product references. To ensure that we keep ourselves grounded in real problems, the book is written as a journal of a fictional company establishing its governance processes. It will introduce managers and directors responsible for various aspects of the governance, risk and compliance problem and where that problem is exposed and how it is addressed in the technology and business applications. The audience for this book is the people that advise the board, the internal audit department and CIO office on controls, security and risk assurance. Consultants that are implementing Financials or GRC Applications who wish to gain an understanding of the Governance Risk and Compliance processes, and how they are represented in Oracle, should find it a useful primer. Risk Assurance professionals will find it a reliable companion.

AIX V6 Advanced Security Features Introduction and Configuration

AIX V6 Advanced Security Features Introduction and Configuration
Author: Chris Almond
Publisher: IBM Redbooks
Total Pages: 418
Release: 2013-08-26
Genre: Computers
ISBN: 0738489247

AIX Version 6.1 provides many significant new security technologies and security enhancements. The purpose of this IBM Redbooks publication is to highlight and explain the security features at the conceptual level, as well as provide practical examples of how they may be implemented. Some features are extensions of features made available in prior AIX releases, and some are new features introduced with AIX V6. Major new security enhancements will be introduced with AIX V6 in 2007: - Trusted AIX (Multilevel Security) - Role Based Access Control (RBAC) - Encrypted File System - Trusted Execution - AIX Security Expert Enhancements This IBM Redbooks publication will provide a technical introduction to these new enhancements. The topics are both broad and very complex. This book will serve as an initial effort in describing all of the enhancements together in a single volume to the security/system hardening oriented audience.