cisa

Good Essays
CISA Essential Exam. Notes
(A concise note covering important conc cpts for CISA exam.)
Version 1.1 (Last Updated: November 5, 2013)
CISA Essential Exam. Notes C op :night: Kali Mamun Published: 14m May 2013 ASIN: BOOCSBKUYA Publisher: Amazon
All rights reserved. No part of this book may be reproduced, stored in retrieval system, copied in any form or b5' any means, electronic, mechanical, photocopying, recording or otherwise transmitted Without `written permission from the publisher. You rnust not circulate this book in any format.
Table of Contents
1. IT AUDITING
Manag' ng IS Audit function
Internal controls
Interna] contro] addresses the two keV aspects: Internal control objectives
IS control objectives: General controls
IS controls
Performing IS Audit
Classification of Audit
Audit programs General audit procedures are: Audit methodologï what is Risk baSed auditing? Audit risk and material itv
Risk assessment technique
Compliance testing Ys. substantive testing
Audit evidence gather-ing Techniques
Sampling
Attribute sampling Variable sampling
Control self-assessment (CSA)
Integrated auditing
Inmortant Doints to remember
2. IT GOYERNAXCE
Introduction
This book consists of a series of important and organized notes prepared by a succ essful CISAL eelru'íidatey who wrote it with simple words to better grasp the core conc epts of IS audit and to these lessons during the final days of
CISA ex am. It will give you an overall understanding of the theme and concepts of IT security processes and procedures, including all the areas of IS audit tested in CISA. These notes will help _vou to get a compact grasp of the total subject areas of CISA within ten hours of study, and help you create an overall mental picture of the subject matter of the CISAL ofñcial guide.
Disclainler: This is not any official notes and does not give any passing guarantee. This is a note prepared by a real exam taker who made it to revise the CISA exam. topics

You May Also Find These Documents Helpful

  • Better Essays

    Cisa

    • 12601 Words
    • 51 Pages

    1. A benefit of open system architecture is that it: A. facilitates interoperability. B. facilitates the integration of proprietary components. C. will be a basis for volume discounts from equipment vendors. D. allows for the achievement of more economies of scale for equipment. ANSWER: A NOTE: Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. In contrast…

    • 12601 Words
    • 51 Pages
    Better Essays
  • Better Essays

    CISA

    • 5575 Words
    • 29 Pages

    Review Test Submission: Exam 2 Fall 2014 Question 1 1 out of 1 points False The process of data mining consists of two primary processes: data repository creation and deployment. Question 2 1 out of 1 points SNA Organizations frequently employ ____ to identify subject experts and then set up mechanisms to facilitate the passing of knowledge from those experts to colleagues. Question 3 1 out of 1 points Wi-FI Areas around access points…

    • 5575 Words
    • 29 Pages
    Better Essays
  • Powerful Essays

    Domain 5 of CISA Exam

    • 2217 Words
    • 7 Pages

    Domain 5 of CISA Exam Protection of Information Assets Clarence Murphy 4345146 ISSC471 IT Security: Auditing American Military University Dr. Eric Yocam 23 Oct 2014 Domain 5 of CISA Exam Protection of Information Assets Introduction Domain 5 of the CISA exam covers protection of information assets and includes eight areas of competence. This part of the CISA exam is weighted 30 percent of the overall score, which is the most of any domain. This emphasizes the importance of information asset…

    • 2217 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cisa Exam Notes - Wan

    • 5277 Words
    • 22 Pages

    Compiled by A.K.Asokan. (E-mail:asokanak@hotmail.com) Page Nos.1 of 16 WIDE AREA NETWORK Local Area Network can be easily understood since typically every office has a LAN. One could personally see the switches connecting various computer nodes and may be a router to which the switches are connected. Also we can see the Network Interface Card (NIC) at the back of the computer where we plug in the cable with the RJ45 connector, the blinking light etc. on the card. (Sometimes when it is not…

    • 5277 Words
    • 22 Pages
    Good Essays
  • Best Essays

    Code Galore Caselet: Using COBIT® 5 for Information Security IF5141-01 Manajemen Keamanan Informasi Sem II-2013/2014 Disclaimer ISACA has designed and created the Code Galore Caselet : Using COBIT® 5 for Information Security (the ‘Work’) primarily as an educational resource for educational professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive…

    • 678 Words
    • 3 Pages
    Best Essays
  • Powerful Essays

    Required: ISACA, CISA Review Manual- 2013, ISACA publication, Code# CRM11- Required Note: You can buy any edition of the aforementioned text. 2008,2009, 2010, and 2011 editions are all good, and are much cheaper from various sources…

    • 746 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    awesome research

    • 7892 Words
    • 39 Pages

    compliance. Founded in 1969, ISACA sponsors international conferences, publishes the ISACA® Journal, and develops international IS auditing and control standards. It also administers the globally respected Certified Information Systems Auditor™ (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) designations. ISACA offers the Business Model for Information Security™ (BMIS™)…

    • 7892 Words
    • 39 Pages
    Good Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    ISACA sponsors international conferences, publishes the Information Systems Control Journal®, develops international information systems auditing and control standards, and administers the globally respected Certified Information Systems Auditor™ (CISA®) designation, earned by more than 35,000 professionals since inception, and the Certified Information Security Manager® (CISM®) designation, a groundbreaking credential earned by 5,000 professionals in its first two years. Disclaimer The IT Governance…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Powerful Essays

    The Business need for Security Can multi factor authentication be breached? Authentication: Fundamental of information security is based on three principle Confidentiality, Integrity and Availability. How a user will be able to access asset by following these three principle is called as Access control. “Access control is the process of allowing only authorized users, programs and other computer system (i.e. networks) to observe, modify or otherwise take possession of resources of a computer…

    • 553 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    George Orwell Privacy

    • 1000 Words
    • 4 Pages

    the ability to watch each individual at all times. Not only do televisions have cameras and sensors in the 21th century; telephones, computers, tablets, and even cars have cameras built into them as well. With one push of a button the NSA, CIA, or CISA could hack any device you own with a camera to watch and listen to everything going on around you. According to Ric Simmons “Nearly every cell phone in use today is required to contain a GPS-based locator device, so that emergency responders can locate…

    • 1000 Words
    • 4 Pages
    Good Essays