top of page
School LIbrary

WELCOME TO CHANDRA'S BLOG

This blog is my attempt to share my learning and help to learn especially in IT domain
Enjoy Learn!! Enjoy Sharing!!

Home: Welcome
Home: Blog Feed
Home: Blog2

Secure Project Management

According to the Project Management Institute (2008), the success of a project is classified into 5 levels. These success levels are...

Risk Based Auditing

IS audit is a formal examination, interview and/or testing of an information system to determine the compliance of information system...

Planning the audit

The effectiveness and efficiency of an audit process are only possible due to the robustness of planning the audit or audit planning. The...

How to draft an IS audit charter?

As an IT Auditor, the foremost thing that he/she has to do is to confirm about Information System (IS) Audit Charter. And it's obvious to...

Mitigation Methods in DNS Hacking

My last blog was about the hacking incident that one of the popular websites in Nelson was hacked through a DNS attack. In that blog, I...

A hacking case: (DNS Hacking)

Let me share with you a case where I got a chance to be a part and study a hack of a website, one of the most popular sites in Nelson. I...

Comparative study of ITIL and COBIT

The fundamental concept of ITIL and COBIT is discussed in this blog. These both are globally recognized IT governance frameworks....

Introduction to COBIT

“Control Objectives for Information and Related Technology” COBIT A business framework to allow for IT enterprise management and...

Basic Concept on ITIL

Many of us are not unaware about the term ITIL. What is it exactly? What are its key concepts? Who uses it? What are its benefits? In...

Teacher Writing a Formula on a Blackboard

Contact

Thanks for your interest. For more information, feel free to get in touch and I will get back to you soon!

Home: Contact

Subscribe Form

Thanks for submitting!

Home: Subscribe
bottom of page