C


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

callback systems
Capability Maturity Model (CMM)
carbon dioxide
CAs (Certificate Authorities) 2nd
CCB (change control board)
CCB (change-control board)
CCIPS (Computer Crime and Intellectual Property Section)
CD-ROM 2nd 3rd 4th 5th 6th
     explanations of answers
     installing 2nd
     minimum system requirements 2nd
     question types
     technical support
     test modes 2nd
central processing units (CPUs)
centralized access-control administration
CERT Coordination Center
Certificate Authorities (CAs) 2nd
certificate revocation lists (CRLs)
certificates, digital 2nd
certification
Certified Tech Trainers CD-ROM 2nd 3rd 4th 5th 6th
     explanations of answers
     installing 2nd
     minimum system requirements 2nd
     question types
     technical support
     test modes 2nd
change control 2nd 3rd 4th 5th
     systems software 2nd
change control board (CCB)
change management
     change control and emergency change-management 2nd
     strategies and policies 2nd 3rd
change requests (CRs) 2nd
change-control board (CCB)
change-management process
charts (PERT)
CIA triad
circuit-level gateways 2nd
CISA exam
     answer key 1 2nd 3rd 4th 5th 6th
     answer key 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
    exam prep questions
         application systems 2nd 3rd 4th
         business process evaluation 2nd 3rd 4th 5th 6th 7th
         disaster recovery and business continuity 2nd 3rd 4th
         IS audit process 2nd 3rd
         management, planning, and organization of IS 2nd 3rd
         security 2nd 3rd 4th 5th
     practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
     self-assessment
         educational background 2nd
         exam readiness 2nd
         hands-on experience 2nd
         ideal Certified Information Systems Auditor candidate 2nd 3rd
Classic Life Cycle Model
closing
     projects
CMM (Capability Maturity Model) 2nd
CMM (Software Capability Maturity Model) 2nd
CO2
CobiT framework
     hardware policy
CobiT framework (ISACA) 2nd 3rd
Code of Professional Ethics (ISACA) 2nd 3rd 4th
codification 2nd
cognitive passwords
cold sites
collisions (network) 2nd
Common Vulnerability and Exposure (CVE)
communicating audit results 2nd 3rd 4th
communication
     communicating audit results 2nd 3rd
     techniques 2nd
communications handlers
communications teams
completeness checks
compliance audits
compliance testing 2nd
Computer Crime and Intellectual Property Section (CCIPS)
computer operations
     segregation of duties
computing function point metrics 2nd
conclusions (audit) 2nd
    evidence
         obtaining 2nd 3rd
         preserving 2nd 3rd
     information-gathering techniques 2nd 3rd 4th
     organization's use of system platforms, IT infrastruction, and applications 2nd
concurrency 2nd
confidentiality agreements
configuration management
     systems software 2nd
configuration management (hardware) 2nd 3rd
contingency policies
continuity risk
contract audit objectives 2nd
contract management 2nd
     confidentiality agreements
     contract audit objectives 2nd
     discovery agreements
     employee contracts
     noncompete agreements
     trade secret agreements
control group
control risk
control self-assessment (CSA) 2nd
controlling
     projects
controls
     administrative controls
     aligning with business objectives
         applications 2nd
         data management
         IT department heads
         IT steering committees 2nd
         operations
         organizational structure 2nd 3rd
         quality assurance
         security department 2nd
         strategic planning 2nd
         technical support
     hardware 2nd 3rd 4th 5th 6th 7th
         aquisition control objectives 2nd 3rd 4th 5th
         CobiT framework
         ITT (invitation to tender) 2nd 3rd
     internal accounting controls
     IS operational practices 2nd
     logical access controls 2nd 3rd
         access
         access paths
         access-control matrices
         ACLs (access-control lists) 2nd
         authentication 2nd 3rd 4th
         authorization
         centralized/decentralized
         discretionary access
         identification 2nd 3rd 4th
         lattice-based access
         MACs (mandatory access controls) 2nd
         nondiscretionary access 2nd
         restricted interfaces
         role-based access
         rule-based access
         subjects 2nd
         task-based access
     logical security controls 2nd 3rd
     network infrastructure 2nd 3rd
     objectives and activities 2nd 3rd 4th
     operational controls
     physical security controls 2nd 3rd 4th 5th 6th 7th
         biometric systems 2nd
     systems software 2nd
     table of 2nd
controls (application) 2nd 3rd
     automated controls 2nd
     data integrity controls 2nd
     data validation edits and controls 2nd 3rd 4th
     EDI (electronic data interchange) 2nd 3rd
     input/output controls
         batch controls
         input authorization 2nd
     manual controls
     output controls 2nd
     processing controls 2nd
CPM (Critical Path Methodology)
CPUs (central processing units)
crackers
CRCs (cyclical redundancy checks)
credentials
crisis management. [See BCPs (business continuity plans), DRPs (disaster recovery plans)]
critical functions
Critical Path Methodology (CPM)
CRLs (certificate revocation lists)
CRM (customer relationship management)
CRs (change requests) 2nd
cryptography
CSA (control self-assessment) 2nd
Custom mode (Certified Tech Trainers CD-ROM)
customer relationship management (CRM)
CVE (Common Vulnerability and Exposure)
cyclical redundancy checks (CRCs)



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net