Changes

Jump to navigation Jump to search
35 bytes removed ,  12 years ago
Line 37: Line 37:  
* '''Certified Information Security Manager (CISM)'''-Currently over 85,000 professionals have been certified on assessment, auditing, control or security and monitoring information technology and business systems.
 
* '''Certified Information Security Manager (CISM)'''-Currently over 85,000 professionals have been certified on assessment, auditing, control or security and monitoring information technology and business systems.
 
* '''Certified Information Systems Manager'''- There are 16,000 professionals engaged in information security management that have been certified by the program since its establishment in 2003.
 
* '''Certified Information Systems Manager'''- There are 16,000 professionals engaged in information security management that have been certified by the program since its establishment in 2003.
* '''Certified in the Governance of Enterprise IT (CGEIT)'''- The program was launched in 2007 for professionals whose responsibilities are focused on IT governance. Around 4,500 professionals were certified under this program.
+
* '''Certified in the Governance of Enterprise IT (CGEIT)'''- The program was launched in 2007 for professionals whose responsibilities are focused on IT governance. Around 4,500 professionals are certified under this program.
* '''Certified in Risk and Information Systems Control (CRISC)'''- This program was introduced in 2010 and it was specifically designed for IT professionals who are interested in acquiring knowledge about IT risks identification, management,development,  implementation and maintenance of information systems controls. Since its establishment, over 14,000 professionals have already been certified by the program.
+
* '''Certified in Risk and Information Systems Control (CRISC)'''- This program was introduced in 2010 and it was specifically designed for IT professionals who are interested in acquiring knowledge about IT risk identification, management,development,  implementation and maintenance of information systems controls. Since its establishment, over 14,000 professionals have already been certified by the program.
    
==IT Governance Institute==
 
==IT Governance Institute==
In 1998, ISACA founded the IT Governance Institute (ITGI) due to the heightened significance of information technology as one of the key factors towards the success of entities or companies. The institute's main objective is to help business owners enhance their governance on information technology and develop IT in accordance with international standards. ITGI also aims to support businesses in  able maximizing IT in achieving their business goals, enhance their business investments as well as appropriately and effectively manage the risks and opportunities associated with information technology. The main activity of the institute is conducting original research on IT governance. Its' recent publications include:<ref>
+
In 1998, ISACA founded the [[IT Governance Institute]] (ITGI) due to the heightened significance of information technology as one of the key success factors for entities or companies. The institute's main objective is to help business owners enhance their governance of information technology and develop IT in accordance with international standards. ITGI also aims to help businesses achieve their business goals, enhance their business investments, and as appropriately and effectively manage the risks and opportunities associated with information technology. The main activity of the institute is conducting original research on IT governance. Its' recent publications include:<ref>
 
[http://www.itgi.org/template_ITGI923a.html?Section=About_ITGI&Template=/ContentManagement/HTMLDisplay.cfm&ContentID=57434 About ITGI]</ref>
 
[http://www.itgi.org/template_ITGI923a.html?Section=About_ITGI&Template=/ContentManagement/HTMLDisplay.cfm&ContentID=57434 About ITGI]</ref>
 
* An Executive View on IT Governance
 
* An Executive View on IT Governance
Line 48: Line 48:     
==ISACA and ICANN==
 
==ISACA and ICANN==
IN 2009, Peter Wood, member of ISACA’s Conference Committee and founder of First Base Technologies warned that [[ICANN]]'s plan to support non-Latin characters, including Mandarin, Arabic, Hindu and Cyrillic in implementing the Internationalized Domain Names ([[IDN]]s will increase consumer fraud and cyber security attacks such as phising. In his comments Wood explained, "Glyphs representing certain characters from different scripts might appear similar or even identical. For example, in many fonts, Cyrillic lowercase A ("a") is indistinguishable from Latin lowercase A ("a"). An unscrupulous host site can use this visual ambiguity to pretend to be another site and take advantage of site visitors.
+
In 2009, [[Peter Wood]], member of ISACA’s Conference Committee and founder of First Base Technologies warned that [[ICANN]]'s plan to support non-Latin characters, including Mandarin, Arabic, Hindu and Cyrillic by implementing the [[IDN|Internationalized Domain Names]] (IDNs) will increase consumer fraud and cyber security attacks such as phising. In his comments Wood explained, "Glyphs representing certain characters from different scripts might appear similar or even identical. For example, in many fonts, Cyrillic lowercase A ("a") is indistinguishable from Latin lowercase A ("a"). An unscrupulous host site can use this visual ambiguity to pretend to be another site and take advantage of site visitors”.<ref>[http://www.itbsoftware.com/pr/34177 ISACA Warns Increase in Web Site Characters Could Lead to More Phishing Attacks]</ref>
<ref>[http://www.itbsoftware.com/pr/34177 ISACA Warns Increase in Web Site Characters Could Lead to More Phishing Attacks]</ref>
      
==References==
 
==References==

Navigation menu