Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Gregg M. — CISA Exam Cram
Gregg M. — CISA Exam Cram



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: CISA Exam Cram

Àâòîð: Gregg M.

Àííîòàöèÿ:

CISA Exam Prep

Certified Information Systems Auditor



Michael Gregg



Your Complete Certification Solution!



The Smart Way to Study™



In This Book You’ll Learn How To:

* Approach the IS audit process from ISACA’s view of IS auditing best practices
* Relate and apply information security and systems audit best practices to the six CISA job practice areas
* Understand the IS audit process and learn how to apply best practices to secure an organization’s assets
* Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls
* Minimize risk within an IT/IS environment by using sound security techniques and practices
* Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives
* Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk
* Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity
* Streamline your exam preparations with our exam insights, tips, and study strategies


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Èçäàíèå: Second Edition

Ãîä èçäàíèÿ: 2006

Êîëè÷åñòâî ñòðàíèö: 480

Äîáàâëåíà â êàòàëîã: 11.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
802.11 standards      269
Abnormal events, tracking      202—203
access creep      301
Accuracy of biometric systems      388
Acid (atomicity, consistency, isolation, durability) test      464
ACID test (atomicity, consistency, isolation, and durability)      171 229 464
Active attacks      314—319 467
Active RFID tags      218
Administrative audits      41
AES (Advanced Encryption Standard)      344
Aggregation      226
Agile Software Development      143—144
Al-Kindi, Abu      340
ALE (Annual Loss Expectancy)      452
ALE (annual loss expectancy), calculating      85 416
Algorithms      341
Alternative applicationdevelopment techniques      142—145
ANSI X12      180
Answers (practice exam)      509—525
application layer, OSI reference model      246
Application layer, TCP/IP model      253—254
Application proxies      263
Application testing      172—173
Applications, auditing      168
Applications, auditing, continuous online auditing      173—175
Applications, auditing, data integrity controls      170—171
Applications, auditing, via observation and testing      169—170
Applications, disposing of      140—141
applications, testing      172—173
Application—development techniques      142—145
AR (abandon rate)      199
Arithmetic logic unit      210
ARO (annual rate of occurrence) estimating      416
ARP (Address Resolution Protocol)      251
artificial intelligence      185
ASCII (American Standard Code for Information Exchange)      225
assemblers      222 463
Asset identification      81—83
Assets, information assets, classifying      296—297
Assets, information assets, evaluating      296
Asymmetric encryption      341 344
Asymmetric encryption, ECC      345
Asymmetric encryption, RSA encryption      345
Asynchronous attacks      316
ATBASH      340
ATM (Asynchronous Transfer Mode)      267
Attack-detection tools      311
Attacks, active      314—319
Attacks, against Bluetooth      327
Attacks, cryptographic      351—352
Attacks, passive      313—314
Attenuation      256
Attribute sampling      47 450
Attributes      226
Attributes of CSAs      51
Audit monitors      181
Audit opinion, required elements      49
Audit planning process      26—27
Audit programs      41
Audit reduction tools      200 312
Auditing      39
Auditing, applications      168
Auditing, applications, continuous online auditing      173—175
Auditing, applications, data integrity controls      170—171
Auditing, applications, testing methods      172—173
Auditing, applications, via observation and testing      169—170
Auditing, business application systems, business intelligence      182—186
Auditing, business application systems, e-commerce      179—180
Auditing, business application systems, EDI      180—181
Auditing, business application systems, email      181—182
Auditing, classifying types of audits      40—41
Auditing, compliance testing      46
Auditing, continuous auditing      52
Auditing, continuous online auditing      174
Auditing, CSAs      50—51
Auditing, evidence      47
Auditing, evidence, reliability of      48
Auditing, fraud, detecting      49
Auditing, general control procedures      37
Auditing, independence as requirement      40
Auditing, information security      335
Auditing, information security, data ownership      335—336
Auditing, information security, security baselines      336
Auditing, information system control procedures      37
Auditing, infrastructure security      337
Auditing, infrastructure security, change management      339—340
Auditing, infrastructure security, network assessments      339
Auditing, infrastructure security, penetration testing      337—339
Auditing, integrated auditing      51—52
Auditing, internal controls, CobiT      38—39
Auditing, ISACA code of ethics      31—32
Auditing, methodology      42—43
Auditing, methodology, documentation      43—45
Auditing, objectives, defining      45
Auditing, project management      177—178
Auditing, risk analysis      32
Auditing, risk analysis, categories of risk      32—33
Auditing, risk management      33
Auditing, risk management, monitoring phase      35
Auditing, risk management, risk management team, establishing      33—34
Auditing, risk management, risk mitigation      34
Auditing, risk-based      35—36
Auditing, sampling      46—47
Auditing, substantive testing      46
Auditing, systems development      176—177
AUPs (Acceptable Use Policies)      311
Authentication by characteristic      306—307
Authentication by knowledge      304—305
Authentication by ownership      305
Authentication, biometric systems      387—389 466
Authentication, digital signatures      346—347
authentication, Kerberos      309
Authentication, single sign-on      307—309
Automated WPs, documenting audit findings      43—45
Availability, reports      219
Availability, role in IS      295—296
Awareness and training, role in overcoming privacy issues      298
B-to-B (Business to Business) e-commerce model      179
B-to-C (Business to Consumer) e-commerce model      179
B-to-E (Business to Employee) e-commerce model      179
B-to-G (Business to Government) e-commerce model      179
Background checks      92
Backup and restoration methods      431—432
Backup and restoration methods, media rotation      433
Backup and restoration methods, SANs      434
Backup power supplies      382
Balance data      165
Balanced matrix organizational form      119
Balanced score card      71
Balanced score card, performance, measuring      72
Base case system evaluation      173
Baseband transmission      256
Basel Accord Standard II      25
bastion hosts      265
Batch control      160
Batch controls      162
BCP (business continuity plan)      409 471
BCP (business continuity plan), BIA      411—412
BCP (business continuity plan), BIA, criticality analysis      416—417
BCP (business continuity plan), BIA, information gathering      413
BCP (business continuity plan), BIA, loss, methods of calculating      412—413
BCP (business continuity plan), implementation and testing phase      421—423
BCP (business continuity plan), implementation and testing phase, full operation tests      424
BCP (business continuity plan), implementation and testing phase, paper tests      423
BCP (business continuity plan), implementation and testing phase, preparedness tests      424
BCP (business continuity plan), monitoring and maintenance      425
BCP (business continuity plan), plan design and development      419—420
BCP (business continuity plan), project management and initiation      410
BCP (business continuity plan), recovery strategy      417—419
BCP (business continuity plan), tests      473
BCP (business continuity plan), training and awareness      420—421
BCP (business continuity plan), verifying      436—437
Beaman, Bob      225
Berners-Lee, Tim      272
Best practices for IT governance, goals of      67—68
BIA (business impact analysis)      472
BIA (business impact analysis), criticality analysis      416—417
BIA (business impact analysis), information gathering      413
BIA (business impact analysis), loss, methods of calculating      412—413
BIA (business impact analysis), role in BCP process      411—412
Biometric systems      306—307 387—389 466
Black Hats      331
Black-box tests      456
Block cipher algorithm      343
Blu-ray discs      213
Bluetooth      243 327
Bollards as physical security control      373
Bottom-up policy development      75 451
bottom-up testing      137
BRI (Basic Rate Interface)      268
bridges      259 261
Broadband transmission      256
broadcast domains      259
Broadcast transmission      251
brute-force attacks      318
Bump keys      379
Bus topology      255
Business application development      130—131
Business application development, systems-development methodology      131—132
Business application systems, business intelligence      182
Business application systems, business intelligence, artificial intelligence      185
Business application systems, business intelligence, CRM      185
Business application systems, business intelligence, data architecture components      183
Business application systems, business intelligence, DSS      184—185
Business application systems, business intelligence, SCM      186
Business application systems, e-commerce, auditing      179—180
Business application systems, EDI      180—181
Business application systems, email      181—182
Business intelligence      182
Business intelligence, artificial intelligence      185
Business intelligence, CRM      185
Business intelligence, data architecture components      183
Business intelligence, DSS      184—185
Business intelligence, SCM      186
Business process controls      159
Business process controls, input controls      160—162
Business process controls, output controls      166—167
Business process controls, processing controls      162—164
Business process controls, processing controls, data file controls      165—166
Business Software Alliance      230
Bypass label processing      311
CAATs (computer-assisted auditing techniques)      43
Cabling, attenuation      256
cabling, coaxial      256
cabling, fiber-optic      257
Cabling, plenum-grade      256
Cabling, twisted pair      256
Cabling, wireless communication      257
Caesar's cipher      340
Calculating, ALE      85 416 452
Calculating, project task time estimates      127
Calculating, SLE      86 416
Capacity management      220—221 463
Categories of twisted-pair cabling      256
CBD (component-based development)      145
CDs (compact discs)      213
Cerf, Vinton      272
CERTs (Computer Emergency Response Teams), responding to incidents      332—334
CGI (Common Gateway Interface)      273
Chain of custody      41
Change-management      95 206—207 339—340
Change-management, post-deployment      209
Change-management, program library systems      207—208
Change-management, release management      208—209
Changeover, methods of      456
Chargeback method of security system funding      74
Chief privacy officer, role in information security      295
Chief security officer, role in information security      295
Cipher text-only attacks      351
Circuit-level firewalls      321
Circuit-level proxies      264
Circuit-switched WANs      268
Citizen programmers      138
Class A networks      251
Class B networks      251
Class C networks      251
Classifying, information assets      296—297
Classifying, types of audits      40—41
Client systems      215
client/server networks      216
Client/server networks, security      324—325
closing projects      128—129
CMM (Capability Maturity Model)      98 453
Coaxial cable      256
CobiT (Control Objectives for Information and Related Technology)      38—39 98 454
COBOL (Common Business-Oriented Language)      222
COCOMO (Constructive Cost Model)      122
Cohen, Fred      316
Cold sites      427
collision domains      259
Collisions      259
Commercial data-classification system      297
Commercial information classification system      393
Common Criteria      76
Communication-driven DSS      184
Comparative analysis      317
Comparing OSI reference model and TCP/IP model      249
Compilers      222 463
Compliance testing      28 46
Compliance, ensuring      46—47
Compliance, regulatory standards, verifying with external regulations      25—26
computer forensics      334—335
Computer viruses      316
Computers      214
Computers, types of      462
Confidential information, handling      312—313
Confidentiality, role in IS      295—296
Confidentiality-based data classification systems      297
Content switches      260
Continuous assurance      52
Continuous audit techniques      52 460
Continuous backups      432
Continuous online auditing      173—175
Control procedures, information system control      449—450
Control procedures, processing control      458
Control unit (CPU)      210
Control zones      314
Controls for physical security      371
Controls for physical security, exterior controls      372—374
Controls for physical security, interior controls      375—378
Controls for physical security, personnel controls      379—381
Controls, compliance testing      46
Cookies      273
Core competency      94
Corrective control      76
COSO (Committee for Sponsoring Organizations of the Treadway Commission)      25 99
Cost of software, estimating      122—123
CPM (critical path methodology)      127 455
CPTED (crime prevention through environmental design)      373
CPUs      210 461
CPUs, Kilby, Jack      212
CPUs, types of      461
crackers      331
Crashing      127
Critical systems      472
Criticality analysis, quantitative method      416—417
CRM (Customer Relationship Management)      185 227
Cross-cut shredders      369
CRs (change requests)      96
Cryptographic attacks      351—352
1 2 3 4 5
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå