Allen Keele has 20 certifications, the CISA, CISM, CISSP, and Security+ among them. As president and program developer for Certified Tech Trainers, he has over 14 years experience in information security and risk management. He has authored books on security and lectures at leading companies such as Deloitte and Touche, Blue Cross-Blue Shield, and Fujitsu.
Keith Mortier holds a CISA and CISSP certification and a BS in Computer Information Systems. Within the IT industry, Keith has designed and implemented risk assessment, vulnerability testing and disaster recovery-security plans. Keith is president of LMI solutions providing security services to both commercial and government clients.
Introduction | xxi | ||||
Self-Assessment | xxxii | ||||
Chapter 1 The Information Systems (IS) Audit Process | 1 | (54) | |||
|
2 | (1) | |||
|
2 | (7) | |||
|
3 | (3) | |||
|
6 | (3) | |||
|
9 | (2) | |||
|
9 | (1) | |||
|
10 | (1) | |||
|
11 | (2) | |||
|
13 | (6) | |||
|
13 | (1) | |||
|
14 | (1) | |||
|
15 | (2) | |||
|
17 | (1) | |||
|
17 | (1) | |||
|
17 | (1) | |||
|
18 | (1) | |||
|
18 | (1) | |||
|
19 | (1) | |||
|
19 | (1) | |||
|
19 | (1) | |||
|
20 | (1) | |||
|
21 | (3) | |||
|
24 | (6) | |||
|
24 | (1) | |||
|
25 | (1) | |||
|
26 | (1) | |||
|
26 | (1) | |||
|
27 | (1) | |||
|
28 | (1) | |||
|
29 | (1) | |||
|
29 | (1) | |||
|
30 | (6) | |||
|
30 | (2) | |||
|
32 | (1) | |||
|
33 | (3) | |||
|
36 | (5) | |||
|
41 | (2) | |||
|
43 | (2) | |||
|
45 | (2) | |||
|
45 | (2) | |||
|
47 | (2) | |||
|
49 | (1) | |||
|
50 | (2) | |||
|
52 | (3) | |||
Chapter 2 Management, Planning, and Organization of IS | 55 | (52) | |||
|
56 | (2) | |||
|
56 | (1) | |||
|
57 | (1) | |||
|
58 | (5) | |||
|
58 | (2) | |||
|
60 | (2) | |||
|
62 | (1) | |||
|
63 | (3) | |||
|
66 | (1) | |||
|
67 | (7) | |||
|
67 | (3) | |||
|
70 | (4) | |||
|
74 | (5) | |||
|
74 | (5) | |||
|
79 | (1) | |||
|
80 | (2) | |||
|
82 | (4) | |||
|
86 | (7) | |||
|
93 | (2) | |||
|
95 | (3) | |||
|
96 | (1) | |||
|
96 | (1) | |||
|
96 | (1) | |||
|
97 | (1) | |||
|
97 | (1) | |||
|
98 | (2) | |||
|
100 | (4) | |||
|
101 | (1) | |||
|
101 | (1) | |||
|
102 | (1) | |||
|
102 | (2) | |||
|
104 | (3) | |||
Chapter 3 Technical Infrastructure and Operational Practices and Infrastructure | 107 | (60) | |||
|
108 | (2) | |||
|
110 | (11) | |||
|
112 | (7) | |||
|
119 | (2) | |||
|
121 | (6) | |||
|
121 | (5) | |||
|
126 | (1) | |||
|
126 | (1) | |||
|
127 | (19) | |||
|
128 | (9) | |||
|
137 | (9) | |||
|
146 | (8) | |||
|
147 | (1) | |||
|
148 | (2) | |||
|
150 | (1) | |||
|
150 | (4) | |||
|
154 | (2) | |||
|
155 | (1) | |||
|
156 | (3) | |||
|
157 | (2) | |||
|
159 | (1) | |||
|
159 | (1) | |||
|
160 | (2) | |||
|
162 | (5) | |||
Chapter 4 Protection of Information Assets | 167 | (50) | |||
|
170 | (1) | |||
|
171 | (7) | |||
|
175 | (3) | |||
|
178 | (16) | |||
|
180 | (7) | |||
|
187 | (2) | |||
|
189 | (2) | |||
|
191 | (2) | |||
|
193 | (1) | |||
|
194 | (4) | |||
|
198 | (2) | |||
|
199 | (1) | |||
|
200 | (3) | |||
|
200 | (2) | |||
|
202 | (1) | |||
|
203 | (4) | |||
|
207 | (1) | |||
|
208 | (1) | |||
|
209 | (4) | |||
|
211 | (1) | |||
|
211 | (1) | |||
|
211 | (1) | |||
|
211 | (1) | |||
|
212 | (1) | |||
|
212 | (1) | |||
|
212 | (1) | |||
|
213 | (4) | |||
Chapter 5 Disaster Recovery and Business Continuity | 217 | (36) | |||
|
218 | (2) | |||
|
220 | (4) | |||
|
224 | (8) | |||
|
226 | (1) | |||
|
227 | (1) | |||
|
227 | (1) | |||
|
228 | (1) | |||
|
228 | (4) | |||
|
232 | (4) | |||
|
232 | (2) | |||
|
234 | (1) | |||
|
235 | (1) | |||
|
236 | (3) | |||
|
236 | (1) | |||
|
236 | (1) | |||
|
236 | (1) | |||
|
237 | (2) | |||
|
239 | (5) | |||
|
239 | (2) | |||
|
241 | (1) | |||
|
242 | (2) | |||
|
244 | (1) | |||
|
244 | (1) | |||
|
244 | (1) | |||
|
245 | (3) | |||
|
248 | (5) | |||
Chapter 6 Business Application System Development, Acquisition, Implementation, and Maintenance | 253 | (30) | |||
|
254 | (1) | |||
|
255 | (9) | |||
|
260 | (1) | |||
|
260 | (1) | |||
|
261 | (3) | |||
|
264 | (4) | |||
|
268 | (2) | |||
|
269 | (1) | |||
|
270 | (3) | |||
|
270 | (1) | |||
|
270 | (2) | |||
|
272 | (1) | |||
|
273 | (6) | |||
|
273 | (2) | |||
|
275 | (1) | |||
|
276 | (3) | |||
|
279 | (4) | |||
Chapter 7 Business Process Evaluation and Risk Management | 283 | (24) | |||
|
284 | (6) | |||
|
284 | (4) | |||
|
288 | (2) | |||
|
290 | (8) | |||
|
291 | (7) | |||
|
298 | (1) | |||
|
299 | (3) | |||
|
302 | (5) | |||
Chapter 8 Practice Exam 1 | 307 | (18) | |||
Chapter 9 Answer Key 1 | 325 | (18) | |||
Chapter 10 Practice Exam 2 | 343 | (18) | |||
Chapter 11 Answer Key 2 | 361 | (20) | |||
Appendix A CD Contents and Installation Instructions | 381 | (6) | |||
|
381 | (2) | |||
|
381 | (1) | |||
|
382 | (1) | |||
|
382 | (1) | |||
|
382 | (1) | |||
|
382 | (1) | |||
|
383 | (1) | |||
|
383 | (1) | |||
|
383 | (1) | |||
|
383 | (1) | |||
|
383 | (2) | |||
|
385 | (2) | |||
CISA Glossary | 387 | (20) | |||
Index | 407 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.