David L. Cannon 
CISA Certified Information Systems Auditor Study Guide [EPUB ebook] 

Dukung

The ultimate CISA prep guide, with practice exams

Sybex’s CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you’ll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation.

For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared.


  • Discover how much you already know by beginning with an assessment test

  • Understand all content, knowledge, and tasks covered by the CISA exam

  • Get more in-depths explanation and demonstrations with an all-new training video

  • Test your knowledge with the electronic test engine, flashcards, review questions, and more


The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you’re looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

€47.99
cara pembayaran

Daftar Isi

Introduction xix

Assessment Test xlii

Chapter 1 Secrets of a Successful Auditor 1

Understanding the Demand for IS Audits 2

Executive Misconduct 3

More Regulation Ahead 5

Basic Regulatory Objective 7

Governance is Leadership 8

Three Types of Data Target Different Uses 9

Audit Results Indicate the Truth 10

Understanding Policies, Standards, Guidelines, and Procedures 11

Understanding Professional Ethics 14

Following the ISACA Professional Code 14

Preventing Ethical Conflicts 16

Understanding the Purpose of an Audit 17

Classifying General Types of Audits 18

Determining Differences in Audit Approach 20

Understanding the Auditor’s Responsibility 21

Comparing Audits to Assessments 21

Differentiating between Auditor and Auditee Roles 22

Applying an Independence Test 23

Implementing Audit Standards 24

Where Do Audit Standards Come From? 25

Understanding the Various Auditing Standards 27

Specific Regulations Defining Best Practices 31

Audits to Prove Financial Integrity 34

Auditor is an Executive Position 35

Understanding the Importance of Auditor Confidentiality 35

Working with Lawyers 36

Working with Executives 37

Working with IT Professionals 37

Retaining Audit Documentation 38

Providing Good Communication and Integration 39

Understanding Leadership Duties 39

Planning and Setting Priorities 40

Providing Standard Terms of Reference 41

Dealing with Conflicts and Failures 42

Identifying the Value of Internal and External Auditors 43

Understanding the Evidence Rule 43

Stakeholders: Identifying Whom You Need to Interview 44

Understanding the Corporate Organizational Structure 45

Identifying Roles in a Corporate Organizational Structure 45

Identifying Roles in a Consulting Firm Organizational Structure 47

Summary 49

Exam Essentials 49

Review Questions 52

Chapter 2 Governance 57

Strategy Planning for Organizational Control 61

Overview of the IT Steering Committee 64

Using the Balanced Scorecard 69

IT Subset of the BSC 74

Decoding the IT Strategy 74

Specifying a Policy 77

Project Management 79

Implementation Planning of the IT Strategy 90

Using COBIT 94

Identifying Sourcing Locations 94

Conducting an Executive Performance Review 99

Understanding the Auditor’s Interest in the Strategy 100

Overview of Tactical Management 100

Planning and Performance 100

Management Control Methods 101

Risk Management 105

Implementing Standards 108

Human Resources 109

System Life‐Cycle Management 111

Continuity Planning 111

Insurance 112

Overview of Business Process Reengineering 112

Why Use Business Process Reengineering 113

BPR Methodology 114

Genius or Insanity? 114

Goal of BPR 114

Guiding Principles for BPR 115

Knowledge Requirements for BPR 116

BPR Techniques 116

BPR Application Steps 117

Role of IS in BPR 119

Business Process Documentation 119

BPR Data Management Techniques 120

Benchmarking as a BPR Tool 120

Using a Business Impact Analysis 121

BPR Project Risk Assessment 123

Practical Application of BPR 125

Practical Selection Methods for BPR 127

Troubleshooting BPR Problems 128

Understanding the Auditor’s Interest in Tactical Management 129

Operations Management 129

Sustaining Operations 130

Tracking Actual Performance 130

Controlling Change 131

Understanding the Auditor’s Interest in Operational Delivery 131

Summary 132

Exam Essentials 132

Review Questions 134

Chapter 3 Audit Process 139

Understanding the Audit Program 140

Audit Program Objectives and Scope 141

Audit Program Extent 143

Audit Program Responsibilities 144

Audit Program Resources 144

Audit Program Procedures 145

Audit Program Implementation 146

Audit Program Records 146

Audit Program Monitoring and Review 147

Planning Individual Audits 148

Establishing and Approving an Audit Charter 151

Role of the Audit Committee 151

Preplanning Specific Audits 153

Understanding the Variety of Audits 154

Identifying Restrictions on Scope 156

Gathering Detailed Audit Requirements 158

Using a Systematic Approach to Planning 159

Comparing Traditional Audits to Assessments and Self‐Assessments 161

Performing an Audit Risk Assessment 162

Determining Whether an Audit is Possible 163

Identifying the Risk Management Strategy 165

Determining Feasibility of Audit 167

Performing the Audit 167

Selecting the Audit Team 167

Determining Competence and Evaluating Auditors 168

Ensuring Audit Quality Control 170

Establishing Contact with the Auditee 171

Making Initial Contact with the Auditee 172

Using Data Collection Techniques 174

Conducting Document Review 176

Understanding the Hierarchy of Internal Controls 177

Reviewing Existing Controls 179

Preparing the Audit Plan 182

Assigning Work to the Audit Team 183

Preparing Working Documents 184

Conducting Onsite Audit Activities 185

Gathering Audit Evidence 186

Using Evidence to Prove a Point 186

Understanding Types of Evidence 187

Selecting Audit Samples 187

Recognizing Typical Evidence for IS Audits 188

Using Computer‐Assisted Audit Tools 189

Understanding Electronic Discovery 191

Grading of Evidence 193

Timing of Evidence 195

Following the Evidence Life Cycle 195

Conducting Audit Evidence Testing 198

Compliance Testing 198

Substantive Testing 199

Tolerable Error Rate 200

Recording Test Results 200

Generating Audit Findings 201

Detecting Irregularities and Illegal Acts 201

Indicators of Illegal or Irregular Activity 202

Responding to Irregular or Illegal Activity 202

Findings Outside of Audit Scope 203

Report Findings 203

Approving and Distributing the Audit Report 205

Identifying Omitted Procedures 205

Conducting Follow‐up (Closing Meeting) 205

Summary 206

Exam Essentials 207

Review Questions 210

Chapter 4 Networking Technology Basics 215

Understanding the Differences in Computer Architecture 217

Selecting the Best System 221

Identifying Various Operating Systems 221

Determining the Best Computer Class 224

Comparing Computer Capabilities 227

Ensuring System Control 228

Dealing with Data Storage 230

Using Interfaces and Ports 235

Introducing the Open Systems Interconnection Model 237

Layer 1: Physical Layer 240

Layer 2: Data‐Link Layer 240

Layer 3: Network Layer 242

Layer 4: Transport Layer 248

Layer 5: Session Layer 249

Layer 6: Presentation Layer 250

Layer 7: Application Layer 250

Understanding How Computers Communicate 251

Understanding Physical Network Design 252

Understanding Network Cable Topologies 253

Bus Topologies 254

Star Topologies 254

Ring Topologies 255

Meshed Networks 256

Differentiating Network Cable Types 258

Coaxial Cable 258

Unshielded Twisted‐Pair (UTP) Cable 259

Fiber‐Optic Cable 260

Connecting Network Devices 260

Using Network Services 263

Domain Name System 263

Dynamic Host Configuration Protocol 265

Expanding the Network 266

Using Telephone Circuits 268

Network Firewalls 271

Remote VPN Access 276

Using Wireless Access Solutions 280

Firewall Protection for Wireless Networks 284

Remote Dial‐Up Access 284

WLAN Transmission Security 284

Achieving 802.11i RSN Wireless Security 287

Intrusion Detection Systems 288

Summarizing the Various Area Networks 291

Using Software as a Service (Saa S) 292

Advantages 292

Disadvantages 293

Cloud Computing 294

The Basics of Managing the Network 295

Automated LAN Cable Tester 295

Protocol Analyzers 295

Remote Monitoring Protocol Version 2 297

Summary 298

Exam Essentials 298

Review Questions 301

Chapter 5 Information Systems Life Cycle 307

Governance in Software Development 308

Management of Software Quality 310

Capability Maturity Model 310

International Organization for Standardization 312

Typical Commercial Records Classification Method 316

Overview of the Executive Steering Committee 317

Identifying Critical Success Factors 318

Using the Scenario Approach 318

Aligning Software to Business Needs 319

Change Management 323

Management of the Software Project 323

Choosing an Approach 323

Using Traditional Project Management 324

Overview of the System Development Life Cycle 327

Phase 1: Feasibility Study 331

Phase 2: Requirements Definition 334

Phase 3: System Design 339

Phase 4: Development 343

Phase 5: Implementation 354

Phase 6: Postimplementation 361

Phase 7: Disposal 363

Overview of Data Architecture 364

Databases 364

Database Transaction Integrity 368

Decision Support Systems 369

Presenting Decision Support Data 370

Using Artificial Intelligence 370

Program Architecture 371

Centralization vs. Decentralization 372

Electronic Commerce 372

Summary 374

Exam Essentials 374

Review Questions 376

Chapter 6 System Implementation and Operations 381

Understanding the Nature of IT Services 383

Performing IT Operations Management 385

Meeting IT Functional Objectives 385

Using the IT Infrastructure Library 387

Supporting IT Goals 389

Understanding Personnel Roles and Responsibilities 389

Using Metrics 394

Evaluating the Help Desk 396

Performing Service‐Level Management 397

Outsourcing IT Functions 398

Performing Capacity Management 399

Using Administrative Protection 400

Information Security Management 401

IT Security Governance 401

Authority Roles over Data 402

Data Retention Requirements 403

Document Physical Access Paths 404

Personnel Management 405

Physical Asset Management 406

Compensating Controls 408

Performing Problem Management 409

Incident Handling 410

Digital Forensics 412

Monitoring the Status of Controls 414

System Monitoring 415

Document Logical Access Paths 416

System Access Controls 417

Data File Controls 420

Application Processing Controls 421

Log Management 423

Antivirus Software 424

Active Content and Mobile Software Code 424

Maintenance Controls 427

Implementing Physical Protection 430

Data Processing Locations 432

Environmental Controls 432

Safe Media Storage 440

Summary 442

Exam Essentials 442

Review Questions 444

Chapter 7 Protecting Information Assets 449

Understanding the Threat 450

Recognizing Types of Threats and Computer Crimes 452

Identifying the Perpetrators 454

Understanding Attack Methods 458

Implementing Administrative Protection 469

Using Technical Protection 472

Technical Control Classification 472

Application Software Controls 474

Authentication Methods 475

Network Access Protection 488

Encryption Methods 489

Public‐Key Infrastructure 496

Network Security Protocols 502

Telephone Security 507

Technical Security Testing 507

Summary 509

Exam Essentials 509

Review Questions 511

Chapter 8 Business Continuity and Disaster Recovery 517

Debunking the Myths 518

Myth 1: Facility Matters 519

Myth 2: IT Systems Matter 519

From Myth to Reality 519

Understanding the Five Conflicting Disciplines Called Business Continuity 520

Defining Disaster Recovery 521

Surviving Financial Challenges 522

Valuing Brand Names 522

Rebuilding after a Disaster 523

Defining the Purpose of Business Continuity 524

Uniting Other Plans with Business Continuity 527

Identifying Business Continuity Practices 527

Identifying the Management Approach 529

Following a Program Management Approach 531

Understanding the Five Phases of a Business Continuity Program 532

Phase 1: Setting Up the BC Program 532

Phase 2: The Discovery Process 535

Phase 4: Plan Implementation 560

Phase 5: Maintenance and Integration 562

Understanding the Auditor Interests in BC/DR Plans 563

Summary 564

Exam Essentials 564

Review Questions 566

Appendix Answers to Review Questions 571

Index 591

Tentang Penulis

David L. Cannon CISA, CCSP, is President and Founder of Cert Test Training Center, a leading CISA training provider. With more than 20 years of experience in IT training and consulting for IT operations, security, system administration, and management, David teaches CISA preparation courses across the country. He is a frequent speaker and lecturer at the leading security and auditing conferences.
Brian T. O’Hara CISA, CISM, CRISC, CISSP is the Information Security Officer (ISO) for Do it Best Corp. and is an ISSA Fellow. He is the President of the Indiana Infra Gard Members Alliance, a partnership between the FBI and the private sector and President of the Central Indiana Chapter of ISACA.
Featuring test questions by…Allen Keele CISA, CISM, CISSP, ISO 31000 CICRA, ISO 27001 CICA, ISO 27001 Lead Auditor, ISO 22301 Certified Business Continuity Manager, and Certified Fraud Examiner is the founder of Certified Information Security www.certifiedinfosec.com.

Beli ebook ini dan dapatkan 1 lagi GRATIS!
Bahasa Inggris ● Format EPUB ● ISBN 9781119056409 ● Ukuran file 7.2 MB ● Penerbit John Wiley & Sons ● Negara US ● Diterbitkan 2016 ● Edisi 4 ● Diunduh 24 bulan ● Mata uang EUR ● ID 4835114 ● Perlindungan salinan Adobe DRM
Membutuhkan pembaca ebook yang mampu DRM

Ebook lainnya dari penulis yang sama / Editor

3,375 Ebooks dalam kategori ini