Acknowledgments |
|
xxi | |
Introduction |
|
xxiii | |
Chapter 1 Becoming a CISA |
|
1 | (18) |
|
Benefits of CISA Certification |
|
|
2 | (2) |
|
The CISA Certification Process |
|
|
4 | (4) |
|
|
5 | (3) |
|
ISACA Code of Professional Ethics |
|
|
8 | (1) |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
13 | (1) |
|
Applying for CISA Certification |
|
|
13 | (1) |
|
Retaining Your CISA Certification |
|
|
14 | (3) |
|
|
14 | (2) |
|
|
16 | (1) |
|
Revocation of Certification |
|
|
17 | (1) |
|
CISA Exam Preparation Pointers |
|
|
17 | (1) |
|
|
18 | (1) |
Chapter 2 IT Governance and Management |
|
19 | (78) |
|
IT Governance Practices for Executives and Boards of Directors |
|
|
20 | (6) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Information Security Governance |
|
|
23 | (3) |
|
|
26 | (2) |
|
The IT Steering Committee |
|
|
27 | (1) |
|
Policies, Processes, Procedures, and Standards |
|
|
28 | (10) |
|
Information Security Policy |
|
|
29 | (1) |
|
|
30 | (1) |
|
Data Classification Policy |
|
|
30 | (1) |
|
System Classification Policy |
|
|
31 | (1) |
|
Site Classification Policy |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
|
Applicable Laws, Regulations, and Standards |
|
|
37 | (1) |
|
|
38 | (15) |
|
The Risk Management Program |
|
|
39 | (1) |
|
The Risk Management Process |
|
|
40 | (10) |
|
|
50 | (3) |
|
|
53 | (23) |
|
|
53 | (7) |
|
|
60 | (9) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (1) |
|
Performance and Capacity Management |
|
|
75 | (1) |
|
Organization Structure and Responsibilities |
|
|
76 | (10) |
|
Roles and Responsibilities |
|
|
78 | (6) |
|
|
84 | (2) |
|
|
86 | (5) |
|
Auditing Documentation and Records |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (6) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
Chapter 3 The Audit Process |
|
97 | (64) |
|
|
97 | (10) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (3) |
|
|
101 | (1) |
|
Audit Laws and Regulations |
|
|
102 | (5) |
|
|
107 | (8) |
|
ISACA Code of Professional Ethics |
|
|
107 | (1) |
|
ISACA Audit and Assurance Standards |
|
|
107 | (4) |
|
ISACA Audit and Assurance Guidelines |
|
|
111 | (4) |
|
|
115 | (6) |
|
Auditors' Risk Analysis and the Corporate Risk Management Program |
|
|
116 | (2) |
|
Evaluating Business Processes |
|
|
118 | (1) |
|
Identifying Business Risks |
|
|
119 | (1) |
|
|
120 | (1) |
|
Countermeasures Assessment |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (5) |
|
|
121 | (3) |
|
Internal Control Objectives |
|
|
124 | (1) |
|
|
125 | (1) |
|
General Computing Controls |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (24) |
|
|
128 | (1) |
|
|
128 | (3) |
|
Compliance vs. Substantive Testing |
|
|
131 | (1) |
|
Audit Methodology and Project Management |
|
|
131 | (3) |
|
|
134 | (7) |
|
Reliance on the Work of Other Auditors |
|
|
141 | (1) |
|
|
142 | (3) |
|
|
145 | (2) |
|
|
147 | (3) |
|
|
150 | (3) |
|
CSA Advantages and Disadvantages |
|
|
151 | (1) |
|
|
151 | (1) |
|
Self-Assessment Objectives |
|
|
152 | (1) |
|
Auditors and Self-Assessment |
|
|
153 | (1) |
|
Implementation of Audit Recommendations |
|
|
153 | (1) |
|
|
154 | (7) |
|
|
155 | (1) |
|
|
156 | (3) |
|
|
159 | (2) |
Chapter 4 IT Life Cycle Management |
|
161 | (108) |
|
|
162 | (5) |
|
Portfolio and Program Management |
|
|
162 | (3) |
|
Business Case Development |
|
|
165 | (1) |
|
Measuring Business Benefits |
|
|
166 | (1) |
|
|
167 | (25) |
|
|
167 | (2) |
|
Developing Project Objectives |
|
|
169 | (2) |
|
|
171 | (1) |
|
Project Roles and Responsibilities |
|
|
171 | (2) |
|
|
173 | (13) |
|
Project Management Methodologies |
|
|
186 | (6) |
|
The Systems Development Life Cycle (SDLC) |
|
|
192 | (37) |
|
|
193 | (27) |
|
Software Development Risks |
|
|
220 | (1) |
|
Alternative Software Development Approaches and Techniques |
|
|
221 | (5) |
|
|
226 | (1) |
|
Acquiring Cloud-Based Infrastructure and Applications |
|
|
227 | (2) |
|
Infrastructure Development and Implementation |
|
|
229 | (5) |
|
Review of Existing Architecture |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
Maintaining Information Systems |
|
|
234 | (3) |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
237 | (6) |
|
The Business Process Life Cycle and Business Process Reengineering |
|
|
237 | (3) |
|
Capability Maturity Models |
|
|
240 | (3) |
|
|
243 | (2) |
|
|
243 | (1) |
|
Onboarding and Due Diligence |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (6) |
|
|
245 | (3) |
|
|
248 | (2) |
|
|
250 | (1) |
|
Auditing the Systems Development Life Cycle |
|
|
251 | (5) |
|
Auditing Program and Project Management |
|
|
251 | (1) |
|
Auditing the Feasibility Study |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
Auditing Software Acquisition |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Auditing Post-Implementation |
|
|
255 | (1) |
|
Auditing Change Management |
|
|
255 | (1) |
|
Auditing Configuration Management |
|
|
255 | (1) |
|
Auditing Business Controls |
|
|
256 | (1) |
|
Auditing Application Controls |
|
|
256 | (3) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
Testing Online Processing Systems |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
Auditing Third-Party Risk Management |
|
|
259 | (1) |
|
|
260 | (9) |
|
|
262 | (1) |
|
|
263 | (3) |
|
|
266 | (3) |
Chapter 5 IT Service Management and Continuity |
|
269 | (180) |
|
Information Systems Operations |
|
|
270 | (17) |
|
Management and Control of Operations |
|
|
270 | (1) |
|
|
271 | (10) |
|
IT Operations and Exception Handling |
|
|
281 | (1) |
|
|
282 | (1) |
|
Software Program Library Management |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
Information Systems Hardware |
|
|
287 | (14) |
|
|
288 | (2) |
|
Computer Hardware Architecture |
|
|
290 | (10) |
|
|
300 | (1) |
|
|
300 | (1) |
|
Information Systems Architecture and Software |
|
|
301 | (10) |
|
Computer Operating Systems |
|
|
301 | (2) |
|
Data Communications Software |
|
|
303 | (1) |
|
|
303 | (1) |
|
Database Management Systems |
|
|
304 | (3) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Digital Rights Management |
|
|
310 | (1) |
|
|
311 | (53) |
|
|
311 | (1) |
|
|
312 | (3) |
|
|
315 | (2) |
|
|
317 | (11) |
|
|
328 | (36) |
|
|
364 | (60) |
|
Business Continuity Planning |
|
|
364 | (39) |
|
Disaster Recovery Planning |
|
|
403 | (21) |
|
Auditing IT Infrastructure and Operations |
|
|
424 | (15) |
|
Auditing Information Systems Hardware |
|
|
424 | (1) |
|
Auditing Operating Systems |
|
|
424 | (1) |
|
|
425 | (1) |
|
Auditing Database Management Systems |
|
|
425 | (1) |
|
Auditing Network Infrastructure |
|
|
426 | (1) |
|
Auditing Network Operating Controls |
|
|
427 | (1) |
|
|
428 | (1) |
|
Auditing Lights-Out Operations |
|
|
429 | (1) |
|
Auditing Problem Management Operations |
|
|
429 | (1) |
|
Auditing Monitoring Operations |
|
|
430 | (1) |
|
|
430 | (1) |
|
Auditing Business Continuity Planning |
|
|
431 | (4) |
|
Auditing Disaster Recovery Planning |
|
|
435 | (4) |
|
|
439 | (10) |
|
|
442 | (1) |
|
|
443 | (3) |
|
|
446 | (3) |
Chapter 6 Information Asset Protection |
|
449 | (142) |
|
Information Security Management |
|
|
449 | (34) |
|
Aspects of Information Security Management |
|
|
450 | (4) |
|
Roles and Responsibilities |
|
|
454 | (2) |
|
|
456 | (1) |
|
Asset Inventory and Classification |
|
|
457 | (3) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (5) |
|
|
467 | (4) |
|
|
471 | (5) |
|
Security Incident Management |
|
|
476 | (6) |
|
|
482 | (1) |
|
|
483 | (33) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
Access Control Vulnerabilities |
|
|
486 | (1) |
|
Access Points and Methods of Entry |
|
|
487 | (4) |
|
Identification, Authentication, and Authorization |
|
|
491 | (9) |
|
Protecting Stored Information |
|
|
500 | (8) |
|
|
508 | (6) |
|
Protecting Mobile Computing |
|
|
514 | (2) |
|
Network Security Controls |
|
|
516 | (41) |
|
|
516 | (4) |
|
|
520 | (1) |
|
Securing Client-Server Applications |
|
|
521 | (1) |
|
Securing Wireless Networks |
|
|
522 | (4) |
|
Protecting Internet Communications |
|
|
526 | (6) |
|
|
532 | (13) |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
548 | (7) |
|
|
555 | (2) |
|
|
557 | (7) |
|
Environmental Threats and Vulnerabilities |
|
|
557 | (1) |
|
Environmental Controls and Countermeasures |
|
|
558 | (6) |
|
Physical Security Controls |
|
|
564 | (3) |
|
Physical Access Threats and Vulnerabilities |
|
|
564 | (2) |
|
Physical Access Controls and Countermeasures |
|
|
566 | (1) |
|
Auditing Asset Protection |
|
|
567 | (16) |
|
Auditing Security Management |
|
|
567 | (1) |
|
Auditing Logical Access Controls |
|
|
568 | (8) |
|
Auditing Network Security Controls |
|
|
576 | (4) |
|
Auditing Environmental Controls |
|
|
580 | (1) |
|
Auditing Physical Security Controls |
|
|
581 | (2) |
|
|
583 | (8) |
|
|
583 | (2) |
|
|
585 | (3) |
|
|
588 | (3) |
Appendix A Conducting a Professional Audit |
|
591 | (74) |
|
Understanding the Audit Cycle |
|
|
592 | (1) |
|
How the IS Audit Cycle Is Discussed |
|
|
592 | (2) |
|
"Client" and Other Terms in This Appendix |
|
|
593 | (1) |
|
Overview of the IS Audit Cycle |
|
|
594 | (70) |
|
|
595 | (8) |
|
Engagement Letters and Audit Charters |
|
|
603 | (4) |
|
|
607 | (1) |
|
Launching a New Project: Planning an Audit |
|
|
608 | (5) |
|
Developing the Audit Plan |
|
|
613 | (3) |
|
|
616 | (9) |
|
Performing a Pre-Audit (or Readiness Assessment) |
|
|
625 | (2) |
|
Organizing a Testing Plan |
|
|
627 | (4) |
|
Resource Planning for the Audit Team |
|
|
631 | (1) |
|
Performing Control Testing |
|
|
632 | (15) |
|
Developing Audit Opinions |
|
|
647 | (3) |
|
Developing Audit Recommendations |
|
|
650 | (1) |
|
Managing Supporting Documentation |
|
|
650 | (2) |
|
|
652 | (4) |
|
|
656 | (5) |
|
|
661 | (2) |
|
|
663 | (1) |
|
|
664 | (1) |
Appendix B Popular Methodologies, Frameworks, and Guidance |
|
665 | (40) |
|
Common Terms and Concepts |
|
|
665 | (8) |
|
|
666 | (1) |
|
Goals, Objectives, and Strategies |
|
|
667 | (1) |
|
|
668 | (1) |
|
Capability Maturity Models |
|
|
668 | (2) |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
672 | (1) |
|
Frameworks, Methodologies, and Guidance |
|
|
673 | (29) |
|
Business Model for Information Security (BMIS) |
|
|
673 | (1) |
|
COSO Internal Control - Integrated Framework |
|
|
674 | (4) |
|
|
678 | (2) |
|
|
680 | (1) |
|
|
681 | (1) |
|
ISF Standard of Good Practice for Information Security |
|
|
682 | (1) |
|
|
682 | (2) |
|
NIST SP 800-53 and NIST SP 800-53A |
|
|
684 | (1) |
|
NIST Cybersecurity Framework |
|
|
685 | (2) |
|
Payment Card Industry Data Security Standard |
|
|
687 | (2) |
|
|
689 | (2) |
|
|
691 | (1) |
|
|
692 | (1) |
|
|
693 | (2) |
|
|
695 | (1) |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
699 | (1) |
|
Pointers for Successful Use of Frameworks |
|
|
699 | (3) |
|
|
702 | (1) |
|
|
702 | (3) |
Appendix C About the Online Content |
|
705 | (4) |
|
|
705 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
705 | (1) |
|
|
705 | (1) |
|
Single User License Terms and Conditions |
|
|
705 | (2) |
|
|
707 | (1) |
|
|
707 | (2) |
Glossary |
|
709 | (56) |
Index |
|
765 | |