Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Gregg M. — CISA Exam Cram
Gregg M. — CISA Exam Cram



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: CISA Exam Cram

Автор: Gregg M.

Аннотация:

CISA Exam Prep

Certified Information Systems Auditor



Michael Gregg



Your Complete Certification Solution!



The Smart Way to Study™



In This Book You’ll Learn How To:

* Approach the IS audit process from ISACA’s view of IS auditing best practices
* Relate and apply information security and systems audit best practices to the six CISA job practice areas
* Understand the IS audit process and learn how to apply best practices to secure an organization’s assets
* Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls
* Minimize risk within an IT/IS environment by using sound security techniques and practices
* Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives
* Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk
* Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity
* Streamline your exam preparations with our exam insights, tips, and study strategies


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: Second Edition

Год издания: 2006

Количество страниц: 480

Добавлена в каталог: 11.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
smurf attacks      318
sniffers      275
SNMP (Simple Network Management Protocol)      249 275
Sociability tests      456
Social engineering      314
Software development      221
Software development, decompilers      223
Software development, programming languages      222
Software development, sandbox scheme      222
Software escrow      434
Software recovery      431—432
Software, cost estimation      122—123
Software, licensing issues      230
Software, size estimation      123—124
software, testing      455—456
Source code, verifying      460
Sources of physical security breaches      370—371
Sourcing      93
Sourcing, SLAs      95—96
SOX (Sarbanes-Oxley Act)      25 40
Spiral application development model      143 457
Sponsor payment method of security system funding      74
Spreading code      270
Sprints      144
SSH (Secure Shell)      349
SSIDs (Service Set IDs)      269
SSL (Secure Sockets Layer)      349
Standards      28 78
Standards, ISACA auditing standards      28—29
Standby database shadowing      434
Standby UPS systems      383
Standing data      165
star topologies      255
Stateful inspection firewalls      264 321 468
Stateless connections      249
stateless firewalls      322
Statistical IDS detection      323 468
Statistical sampling      46
Steering committee      70
Stochastic events      85
store-and-forward switching      260
STP (shielded twisted-pair)      256
Strategic planning      26
Stream cipher algorithm      343
Strip-cut shredders      369
Strong matrix organizational form      119
Study tips      9—10
subnetworks      250
Substantive testing      46
Substantive tests      28
Supercomputers      215
Supervisory mode      224
SURRE (Sufficient, Useable, Reliable, Relevant, Effective) rule      47
switches      217 259—261
symmetric encryption      341
Symmetric encryption algorithms      469
Symmetric encryption, AES      344
Symmetric encryption, DES      343—344
Symmetric encryption, private key encryption      342—343
Syn floods      319
System access, access creep      301
System access, discretionary access control      301
System access, layers of security controls      299—300
System access, mandatory access control      302
System access, role-based access control      302—303
System testing      137
System-control parameter      165
Systems development, auditing      176—177
T-carriers      268
TACACS      310
Tactical planning      26
Tape-management systems      219
Tasks, CPM      127
TCP (Transmission Control Protocol)      246
TCP/IP model, application layer      253—254
TCP/IP model, host-to-host layer      252—253
TCP/IP model, internet layer      250—252
TCP/IP model, network access layer      250
TCP/IP model, versus OSI reference model      249
technical support      204 206
Telecommunications recovery      434—435
TEMPEST      314
TES (terminal-emulation software)      249
Testing applications      172—173
Testing methodologies      137
Testing phase of BCP process      421—423
Testing phase of BCP process, full operation testing      424
Testing phase of BCP process, paper tests      423
Testing phase of BCP process, preparedness testing      424
testing software      456
Tests (practice), answers      509—525
Tests (practice), questions      476—508
Threat identification      81
threats      32. See also incident handling
Timebox management      128
Tokens      305
Top-down policy development      75 451
top-down testing      137
topologies      254—255 465
Tower of Hanoi tape-rotation scheme      434
Tracking abnormal events      202—203
Training and awareness, role in BCP process      420—421
Transaction files      165
Transaction integrity      46
Transferring risks      449
Transport layer (OSI reference model)      246
Trend-/variance-detect tools      311
Trinoo attacks      319
Trojan horse programs      316
Trouble tickets      204
TSF (time service factor)      199
Tubular locks      377
Tumbler locks      377
Tuples      228
twisted-pair cable      256
Two-factor authentication schemes      305
UAs (uptime agreements)      199
UDP (User Datagram Protocol)      246
Unicast transmission      251
Unicode      226
Unit testing      137
UPSs (Uninterruptible Power Supplies)      382—383
URLs      272
USB      214
User mode (CPU)      211
Utilization reports      219
UTP (unshielded twisted-pair)      256
Vandalism      366
VANs (value-added networks)      180
Variable sampling      46 450
Variance detection tools      200
Verifying, BCP      436—437
Verifying, compliance with external regulations      25—26
Verifying, disaster recovery plans      436—437
Verifying, network infrastructure physical controls      276
Verifying, source code      460
Virtual memory      224
Viruses      316 329—330
Visual Basic      222
Vital systems      472
VLANs (virtual LANs)      261
Voice communications, PBX systems      328—329
Voice communications, phreakers      328
Voice communications, VoIP      329
VoIP (Voice over IP)      268 329
VPNs (Virtual Private Networks)      310
Vulnerabilities, to physical security      365
Vulnerabilities, to physical security, breaches, sources of      370—371
Vulnerabilities, to physical security, man-made events      366—367
Vulnerabilities, to physical security, natural events      365—366
Vulnerabilities, to power systems      381
Walk-through testing      423
Walls as physical security control      377
WANS (wide area networks)      243
WANs (wide area networks), circuit-switched      268
WANs (wide area networks), packet-switched      267—268
war chalking      327
War dialing      316
war driving      327
Warded locks      377
Warm sites      427
Water sprinklers      385—386
Waterfall development model      131 456
WBAD (web-based application development)      145
WBS (Work Breakdown Structure)      120
Weak matrix organizational form      119
Web browsers      272—273
Web servers      216
Web-based trouble tickets      204
Websites, DRII      409
Websites, ISACA      9
Websites, ISACA auditing standards      30
Websites, ISACA code of ethics      32
WEP (Wired Equivalent Privacy)      269—271 326
Wet pipe water sprinklers      385
White-box tests      456
Windows as physical security control      376
Wireless APs      260—261
Wireless communication      257
Wireless communication, APs      260—261
wireless devices      271
wireless LANs, security      326—328
wireless networks      269
wireless networks, 802.11 standards      269
Wireless networks, broadcasting methods      270
wireless networks, security      271
World Wide Web      272
WPAN (wireless PAN)      243
WPs, documenting audit findings      43—45
X.25      267
XP (Extreme Programming)      143 457
Zachma, John      73
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте