Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Gregg M. — CISA Exam Cram
Gregg M. — CISA Exam Cram



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: CISA Exam Cram

Автор: Gregg M.

Аннотация:

CISA Exam Prep

Certified Information Systems Auditor



Michael Gregg



Your Complete Certification Solution!



The Smart Way to Study™



In This Book You’ll Learn How To:

* Approach the IS audit process from ISACA’s view of IS auditing best practices
* Relate and apply information security and systems audit best practices to the six CISA job practice areas
* Understand the IS audit process and learn how to apply best practices to secure an organization’s assets
* Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls
* Minimize risk within an IT/IS environment by using sound security techniques and practices
* Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives
* Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk
* Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity
* Streamline your exam preparations with our exam insights, tips, and study strategies


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: Second Edition

Год издания: 2006

Количество страниц: 480

Добавлена в каталог: 11.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Parallel tests      456
Passive attacks      313—314 467
Passive RFID tags      218
Password-cracking attacks      317
PBX (Private Branch Exchange)      328—329
PCI (Peripheral Component Interface) bus      213
PCMCIA (Personal Computer Memory Card International Association) cards      213
PDAs, handheld computers      215
PDCA (Plan-Do-Check-Act)      209
Peer-to-Peer networks      215
penetration testing      337—339
Performance, measuring      71—72
Personnel controls for physical, guards      379—380
Personnel controls for physical, identification      380
Personnel controls for physical, IDSs      380—381
Personnel controls for physical, security      379
PERT (Program Evaluation and Review Technique)      125
PERT (Program Evaluation and Review Technique), project completion times, calculating      127
PGP (Pretty Good Privacy)      349
Phased changeover      456
Phases of DHCP operation      254
Phases of SLDC implementation      142
phishing      315
phreakers      328 331
Physical layer (OSI reference model)      247
Physical security, authentication      387
Physical security, authentication, biometrics      387—389
Physical security, breaches, sources of      370—371
Physical security, controls      371
Physical security, environmental controls, backup power supplies      381—383
Physical security, environmental controls, fire prevention, detection, and suppression      384—386
Physical security, environmental controls, HVAC      383
Physical security, exterior controls      372—374
Physical security, interior controls      375
Physical security, interior controls, doors      375—376
Physical security, interior controls, locks      377—378
Physical security, interior controls, windows      376—377
Physical security, personnel controls      379
Physical security, personnel controls, guards      379—380
Physical security, personnel controls, identification      380
Physical security, personnel controls, IDSs      380—381
Physical security, policies      389
Physical security, policies, commercial information classification system      393
Physical security, policies, defining      390
Physical security, policies, governmental information classification system      392
Physical security, policies, implementing      391
Physical security, policies, purposes of      390
Physical security, vulnerabilities      365
Physical security, vulnerabilities, man-made events      366—367
Physical security, vulnerabilities, natural events      365—366
PIA (privacy impact analysis)      298 466
Picking locks, methods of      378
PIDAS (perimeter intrusion and detection assessment system)      373
Pilot tests      456
Ping command      274
Ping of Death      318
PKI (Public Key Infrastructure)      347—348 469—470
Plan design and development      419—420
Plenum-grade cable      256
policies      76—77
Policies for physical security      389
Policies for physical security, commercial information classification system      393
Policies for physical security, defining      390
Policies for physical security, governmental information classification system      392
Policies for physical security, implementing      391
Policies for physical security, purposes of      390
Policies for physical security, reviewing      78—79
Policies, disaster recovery, corrective control      76
Policy development      75 77
POP3 (Post Office Protocol Version 3)      249
Portable wireless devices      271
Post-deployment change-management process      209
Post-implementation phase of SDLC      140
POTS (Plain Old Telephone System)      268
Power systems, anomalies vulnerable to      381
Power systems, EPO buttons      382
Power systems, protecting      382
Power systems, UPSs      382—383
Practice exams, answers      509—525
Practice exams, questions      476—508
Preaction water sprinklers      385
Preparedness testing      424 473
Preparing for exam, methods of      7—9
Preparing for exam, resources      4—5
Preparing for exam, study tips      9—10
Presentation layer (OSI reference model)      246
Pretexting      315
PRI (Primary Rate Interface)      268
print servers      216
Privacy      298
Privacy, and trust      298—299
Privacy, Internet issues      273
Privacy, WEP      326
private IP addresses      322
Private key encryption      342—343
Problem escalation      205
Problem management      202
Procedures      77
Procedures for ISACA auditing      30—31
Procedures, reviewing      78—79
Process owner, role in information security      295
Processing controls      162—164 458
Processing controls, data file controls      165—166
Program library systems      207—208
Program servers      216
Programming languages      222
Programming languages, generations of      223
Project management      117
Project management, auditing      177—178
Project management, CPM      455
Project management, key roles      118
Project management, project control and execution      128
Project management, project culture and objectives      119—120
Project management, project initiation      121
Project management, project organizational forms      119
Project management, project organizational types      454
Project management, project planning      121
Project management, project planning, critical paths      127
Project management, project planning, scheduling      125—127
Project management, project planning, software cost estimation      122—123
Project management, project planning, software size estimation      123—124
Project management, project planning, timebox management      128
Project management, projects, closing      128—129
Project management, role in BCP process      410
Project management, SDLC      455
Protecting power systems      382
Protecting power systems, UPSs      382—383
Protocol analyzers      275
Protocols      244
Prototyping      143 457
Proxies      263 321
Proxies, application proxies      263
Proxies, circuit-level proxies      264
Proxy servers      216
Public key encryption      344
Public relations, role in disaster recovery process      408
Pure project organizational form      119
Qualitative risk assessment      87—88
quality management      96—98
Quality management, CobiT      98
Quality management, COSO      99
Quality management, ERP      98
Quantitative analysis      412
Quantitative risk assessment      83—86 452—453
Quantum cryptography      345
Questionnaires, information gathering for BIA      413
Questions (practice exam)      476—508
RAD (Rapid Application Development)      143 457
RADIUS (Remote Access Dial-In User Service)      310
RAID (redundant array of inexpensive disks)      430—431
Rainbow tables      318
RAM (Random Access Memory)      212 259
RBAC (role-based access control)      302—303
RDMSs (relational database-management systems)      228 464
Real-world cryptographic solutions      349—350
Reciprocal agreements      428
Recovering, from hardware failures      429
Recovering, from hardware failures, RAID      430—431
Recovering, from software failures      431—432
Recovery alternatives      425
Recovery alternatives, alternate processing sites      426—429
Recovery strategies      417—419
Recovery strategies, interruptions, types of      418
Red team activities      337
Redundant processing sites      426
Reengineering      144
Referential integrity      170
regression tests      456
Regulatory standards      24—25. See also legislation
Regulatory standards, verifying compliance with      25—26
relational integrity      171
release management      208—209 461
Reliability of evidence, determining      48
Remote-access security      309—311
repeaters      259—261
Rescorla, Rick      384
Resource usage, monitoring      200
Resource usage, monitoring, abnormal events, tracking      202—203
Resource usage, monitoring, incident handling      201
Resource usage, monitoring, keystroke monitoring      200
Resource usage, monitoring, problem management      202
Responding to incidents      330—332
Responding to incidents, auditing information security      335
Responding to incidents, auditing information security, data ownership      335—336
Responding to incidents, auditing information security, security baselines      336
Responding to incidents, computer forensics      334—335
Responding to incidents, emergency response      332—334
Reviewing policies      78—79
RFI (radio frequency interference)      382
RFID tags      218—219
Right-to-audit statements      94
Rijndael      344
ring topology      255
Risk analysis      32
Risk analysis, categories of risk      32—33
Risk analysis, material risks      36
Risk assessment, qualitative      87—88
Risk assessment, quantitative      83—86
Risk management      33 79
Risk management, monitoring phase      35
Risk management, risk management team, establishing      33—34
Risk management, risk mitigation      34
Risk-based auditing      35—36
Risks, mitigating      448
Risks, transferring      449
Risks, types of      448
RMON (Remote Monitoring)      275
Roles of auditor in IT governance      69
Roles of employees, understanding      100—101
Roles of employees, understanding, segregation of duties      101—103
Roles, project management-related      118
Roll-up fixes      208
ROM (read-only memory)      212 462
Rounding-down attacks      317
routers      217 260
Routing protocols      251
Royce, W.W.      131
RPO (recovery point objective)      414 472
RSA encryption      345
RTO (recovery time objective)      414 472
S-HTTP (Secure Hypertext Transfer Protocol)      349
S/MIME (Secure Multipurpose Internet Mail Extensions)      349
Safe Harbor Act      24
Salami technique      317
Sampling      46—47 450
Sandbox scheme      222
SANs (storage area networks)      243 434
SAS 70 reports      95
Satellite systems      257
SCADA (U.S. Supervisory Controls and Data Acquisition)      25
SCARF/EAM (systems control audit review file and embedded audit modules)      460
Scheduling project tasks      125
Scheduling project tasks, estimating task completion times      126—127
SCM (supply chain management)      186
scope creep      136
Screened host firewalls      265 322
Screened subnets      265
Script kiddies      331
Scrubbing locks      379
SCRUM      144 457
SCSI (Small Computer Systems Interface) bus      213
SDLC (system development lifecycle)      117 455
SDLC (system development lifecycle), application disposal      140—141
SDLC (system development lifecycle), business application development      130—131
SDLC (system development lifecycle), business application development, systems-development methodology      131—132
SDLC (system development lifecycle), changeover methods      456
SDLC (system development lifecycle), design phase      136
SDLC (system development lifecycle), development phase      136—139
SDLC (system development lifecycle), feasibility      133
SDLC (system development lifecycle), implementation phase      139—140
SDLC (system development lifecycle), phases of      142
SDLC (system development lifecycle), post-implementation phase      140
SDLC (system development lifecycle), project management      117
SDLC (system development lifecycle), project management, key roles      118
SDLC (system development lifecycle), project management, project control and execution      128
SDLC (system development lifecycle), project management, project culture and objectives      119—120
SDLC (system development lifecycle), project management, project initiation      121
SDLC (system development lifecycle), project management, project organizational forms      119
SDLC (system development lifecycle), project management, project planning      121—128
SDLC (system development lifecycle), project management, projects, closing      128—129
SDLC (system development lifecycle), requirements definition      133—135
SDLC (system development lifecycle), testing phase      456
Secondary storage      212 224
Security advisory group, role in information security      295
Security, authentication, biometric systems      466
Security, baselines, establishing      336
Security, defense-in-depth      293
security, firewalls      263 468
Security, firewalls, screened host firewalls      265
Security, information security governance, funding      73
Security, logical, goals of      294
Security, logical, IS protection mechanisms      294—295
Security, logical, key roles in      295—296
Security, logical, logical access controls      303—312
Security, of wireless networks      271
Security, physical controls      470
Security, physical controls, verifying      276
segregation of duties      101—102
Segregation of duties, compensating controls      102—103
Semipassive RFID tags      218
Semiquantitative analysis      88
Sensitive information, destroying      369—370
Sensitive information, privacy issues      298—299
Sensitive systems      472
Servers      215
service packs      208
Session layer (OSI reference model)      246
SET (Secure Electronic Transaction)      349
Shared cost method of security system funding      73
Shredders, types of      369
Signature IDS detection      323 469
Simple backup-rotation schemes      433
Simplex communication      225
Single Sign-on      307—309
Site licensing      230
Size of software, estimating      123—124
SLAs (service level agreements)      95—96 199
SLE (single loss expectancy), calculating      86 416
SLOC (source lines of code)      123
SMTP (Simple Mail Transfer Protocol)      248
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте