Acknowledgments |
|
xxi | |
Introduction |
|
xxiii | |
Chapter 1 Becoming a CISA |
|
1 | |
|
Benefits of CISA Certification |
|
|
2 | |
|
|
3 | |
|
|
3 | |
|
|
4 | |
|
Substitution of Experience |
|
|
4 | |
|
ISACA Code of Professional Ethics |
|
|
6 | |
|
|
6 | |
|
|
8 | |
|
|
9 | |
|
|
9 | |
|
|
11 | |
|
|
11 | |
|
Applying for Certification |
|
|
11 | |
|
|
12 | |
|
|
12 | |
|
|
14 | |
|
Revocation of Certification |
|
|
14 | |
|
CISA Exam Preparation Pointers |
|
|
15 | |
|
|
15 | |
Chapter 2 IT Governance and Risk Management |
|
17 | |
|
Practices for Executives and Board of Directors |
|
|
18 | |
|
|
18 | |
|
|
18 | |
|
|
19 | |
|
Information Security Governance |
|
|
20 | |
|
|
20 | |
|
|
22 | |
|
The IT Steering Committee |
|
|
23 | |
|
Policy, Processes, Procedures, and Standards |
|
|
24 | |
|
Information Security Policy |
|
|
25 | |
|
|
25 | |
|
|
26 | |
|
|
27 | |
|
|
28 | |
|
The Risk Management Program |
|
|
28 | |
|
The Risk Management Process |
|
|
30 | |
|
|
38 | |
|
|
40 | |
|
|
40 | |
|
|
45 | |
|
|
54 | |
|
|
54 | |
|
|
55 | |
|
|
57 | |
|
|
58 | |
|
Organization Structure and Responsibilities |
|
|
59 | |
|
Roles and Responsibilities |
|
|
61 | |
|
|
66 | |
|
|
68 | |
|
Reviewing Documentation and Records |
|
|
68 | |
|
|
70 | |
|
|
71 | |
|
|
72 | |
|
|
73 | |
|
|
74 | |
|
|
76 | |
Chapter 3 The Audit Process |
|
79 | |
|
|
79 | |
|
|
79 | |
|
|
80 | |
|
|
80 | |
|
|
82 | |
|
Audit Laws and Regulations |
|
|
83 | |
|
|
87 | |
|
ISACA Code of Professional Ethics |
|
|
87 | |
|
|
88 | |
|
|
91 | |
|
|
98 | |
|
|
101 | |
|
Auditors' Risk Analysis and the Corporate Risk Management Program |
|
|
101 | |
|
Evaluating Business Processes |
|
|
101 | |
|
Identifying Business Risks |
|
|
102 | |
|
|
104 | |
|
Countermeasures Assessment |
|
|
104 | |
|
|
104 | |
|
|
105 | |
|
|
105 | |
|
Internal Control Objectives |
|
|
107 | |
|
|
108 | |
|
General Computing Controls |
|
|
109 | |
|
|
109 | |
|
|
110 | |
|
|
111 | |
|
|
111 | |
|
Compliance vs. Substantive Testing |
|
|
113 | |
|
|
113 | |
|
|
116 | |
|
|
122 | |
|
|
122 | |
|
|
124 | |
|
|
126 | |
|
|
127 | |
|
Advantages and Disadvantages |
|
|
127 | |
|
The Self-Assessment Life Cycle |
|
|
128 | |
|
Self-Assessment Objectives |
|
|
128 | |
|
Auditors and Self-Assessment |
|
|
129 | |
|
Implementation of Audit Recommendations |
|
|
129 | |
|
|
130 | |
|
|
131 | |
|
|
132 | |
|
|
134 | |
Chapter 4 IT Life-Cycle Management |
|
135 | |
|
|
136 | |
|
Portfolio and Program Management |
|
|
136 | |
|
Business Case Development |
|
|
138 | |
|
Measuring Business Benefits |
|
|
139 | |
|
|
140 | |
|
|
140 | |
|
Developing Project Objectives |
|
|
141 | |
|
|
142 | |
|
Project Roles and Responsibilities |
|
|
144 | |
|
|
145 | |
|
Project Management Methodologies |
|
|
157 | |
|
The Software Development Life Cycle (SDLC) |
|
|
161 | |
|
|
161 | |
|
Software Development Risks |
|
|
186 | |
|
Alternative Software Development Approaches and Techniques |
|
|
187 | |
|
|
190 | |
|
Infrastructure Development and Implementation |
|
|
191 | |
|
|
192 | |
|
Maintaining Information Systems |
|
|
194 | |
|
The Change Management Process |
|
|
195 | |
|
|
196 | |
|
|
196 | |
|
The Business Process Life Cycle (BPLC) |
|
|
197 | |
|
Capability Maturity Models |
|
|
199 | |
|
|
201 | |
|
|
201 | |
|
|
204 | |
|
|
205 | |
|
Auditing the Software Development Life Cycle |
|
|
206 | |
|
Auditing Project Management |
|
|
207 | |
|
Auditing the Feasibility Study |
|
|
207 | |
|
|
207 | |
|
|
208 | |
|
Auditing Software Acquisition |
|
|
208 | |
|
|
209 | |
|
|
209 | |
|
|
209 | |
|
Auditing Post-Implementation |
|
|
210 | |
|
Auditing Change Management |
|
|
210 | |
|
Auditing Configuration Management |
|
|
210 | |
|
Auditing Business Controls |
|
|
211 | |
|
Auditing Application Controls |
|
|
211 | |
|
|
211 | |
|
|
211 | |
|
|
212 | |
|
Testing Online Processing Systems |
|
|
212 | |
|
|
213 | |
|
|
213 | |
|
|
214 | |
|
|
216 | |
|
|
217 | |
|
|
219 | |
Chapter 5 IT Service Delivery and Infrastructure |
|
221 | |
|
Information Systems Operations |
|
|
221 | |
|
Management and Control of Operations |
|
|
221 | |
|
|
222 | |
|
Infrastructure Operations |
|
|
232 | |
|
|
233 | |
|
Software Program Library Management |
|
|
233 | |
|
|
234 | |
|
|
235 | |
|
Information Systems Hardware |
|
|
235 | |
|
|
235 | |
|
Computer Hardware Architecture |
|
|
237 | |
|
|
244 | |
|
|
245 | |
|
Information Systems Architecture and Software |
|
|
245 | |
|
Computer Operating Systems |
|
|
245 | |
|
Data Communications Software |
|
|
247 | |
|
|
247 | |
|
Database Management Systems |
|
|
248 | |
|
|
252 | |
|
|
252 | |
|
|
253 | |
|
|
254 | |
|
|
256 | |
|
|
258 | |
|
|
268 | |
|
|
269 | |
|
|
277 | |
|
|
280 | |
|
The TCP/IP Suite of Protocols |
|
|
283 | |
|
|
293 | |
|
|
296 | |
|
|
297 | |
|
Auditing IS infrastructure and Operations |
|
|
299 | |
|
|
299 | |
|
Auditing Operating Systems |
|
|
299 | |
|
|
300 | |
|
Auditing Database Management Systems |
|
|
300 | |
|
Auditing Network Infrastructure |
|
|
301 | |
|
Auditing Network Operating Controls |
|
|
302 | |
|
|
302 | |
|
Auditing Lights-Out Operations |
|
|
304 | |
|
Auditing Problem Management Operations |
|
|
304 | |
|
Auditing Monitoring Operations |
|
|
305 | |
|
|
305 | |
|
|
306 | |
|
|
308 | |
Chapter 6 information Asset Protection |
|
309 | |
|
Information Security Management |
|
|
309 | |
|
Aspects of Information Security Management |
|
|
309 | |
|
Roles and Responsibilities |
|
|
313 | |
|
Asset Inventory and Classification |
|
|
314 | |
|
|
316 | |
|
|
318 | |
|
|
319 | |
|
|
323 | |
|
|
326 | |
|
Security Incident Management |
|
|
331 | |
|
|
334 | |
|
|
336 | |
|
|
336 | |
|
|
337 | |
|
|
338 | |
|
|
339 | |
|
Access Points and Methods of Entry |
|
|
340 | |
|
Identification, Authentication, and Authorization |
|
|
343 | |
|
Protecting Stored Information |
|
|
351 | |
|
|
356 | |
|
Protecting Mobile Devices |
|
|
362 | |
|
Network Security Controls |
|
|
362 | |
|
|
362 | |
|
Securing Client-Server Applications |
|
|
365 | |
|
Securing Wireless Networks |
|
|
367 | |
|
Protecting Internet Communications |
|
|
370 | |
|
|
373 | |
|
|
385 | |
|
Private Branch Exchange (PBX) |
|
|
386 | |
|
|
387 | |
|
|
392 | |
|
|
393 | |
|
Environmental Threats and Vulnerabilities |
|
|
394 | |
|
Environmental Controls and Countermeasures |
|
|
395 | |
|
Physical Security Controls |
|
|
400 | |
|
Physical Access Threats and Vulnerabilities |
|
|
400 | |
|
Physical Access Controls and Countermeasures |
|
|
400 | |
|
Auditing Asset Protection |
|
|
401 | |
|
Auditing Security Management |
|
|
402 | |
|
Auditing Logical Access Controls |
|
|
403 | |
|
Auditing Network Security Controls |
|
|
410 | |
|
Auditing Environmental Controls |
|
|
413 | |
|
Auditing Physical Security Controls |
|
|
414 | |
|
|
415 | |
|
|
416 | |
|
|
417 | |
|
|
419 | |
Chapter 7 Business Continuity and Disaster Recovery |
|
421 | |
|
|
422 | |
|
|
422 | |
|
How Disasters Affect Organizations |
|
|
427 | |
|
|
428 | |
|
|
428 | |
|
Business Impact Analysis (BIA) |
|
|
430 | |
|
|
432 | |
|
|
434 | |
|
Developing Recovery Strategies |
|
|
437 | |
|
Developing Recovery and Continuity Plans |
|
|
447 | |
|
Considerations for Continuity and Recovery Plans |
|
|
458 | |
|
Components of a Business Continuity Plan |
|
|
463 | |
|
|
464 | |
|
Testing Recovery and Continuity Plans |
|
|
464 | |
|
|
468 | |
|
Improving Recovery and Continuity Plans |
|
|
469 | |
|
|
469 | |
|
Making Plans Available to Personnel When Needed |
|
|
470 | |
|
Maintaining Recovery and Continuity Plans |
|
|
471 | |
|
Sources for Best Practices |
|
|
471 | |
|
Auditing Business Continuity and Disaster Recovery |
|
|
473 | |
|
Reviewing Business Continuity and Disaster Recovery Plans |
|
|
474 | |
|
Reviewing Prior Test Results and Action Plans |
|
|
476 | |
|
Evaluating Off-Site Storage |
|
|
477 | |
|
Evaluating Alternative Processing Facilities |
|
|
478 | |
|
Interviewing Key Personnel |
|
|
478 | |
|
Reviewing Service Provider Contracts |
|
|
479 | |
|
Reviewing Insurance Coverage |
|
|
479 | |
|
|
480 | |
|
|
481 | |
|
|
482 | |
|
|
484 | |
Appendix A Conducting a Professional Audit |
|
485 | |
|
|
485 | |
|
Understanding the Audit Cycle |
|
|
485 | |
|
How the Information Systems Audit Cycle Is Discussed |
|
|
486 | |
|
Use of the Word "Client" in This Appendix |
|
|
486 | |
|
Overview of the IS Audit Cycle |
|
|
487 | |
|
IS Audit Cycle at a High Level |
|
|
487 | |
|
|
488 | |
|
Engagement Letters ("Contracts") and Audit Charters |
|
|
495 | |
|
|
497 | |
|
Launching a New Project: Planning an Audit |
|
|
499 | |
|
Understanding the Client's Needs |
|
|
499 | |
|
Performing a Risk Assessment |
|
|
500 | |
|
|
501 | |
|
Developing the Audit Plan |
|
|
503 | |
|
Gathering Information"PBC" Lists |
|
|
503 | |
|
A Client's Preparedness for an Audit |
|
|
503 | |
|
Developing Audit Objectives |
|
|
504 | |
|
Developing the Scope of an Audit |
|
|
505 | |
|
Developing a Testing Plan |
|
|
506 | |
|
Understand the Controls Environment |
|
|
507 | |
|
Perform a Pre-audit (or "Readiness Assessment") |
|
|
515 | |
|
|
516 | |
|
Resource Planning for the Audit Team |
|
|
520 | |
|
|
521 | |
|
Project Planning with the Client |
|
|
521 | |
|
Gathering Testing Evidence |
|
|
521 | |
|
|
523 | |
|
Performing Tests of Control Existence |
|
|
524 | |
|
Perform Testing of Control Operating Effectiveness |
|
|
526 | |
|
Discovering Testing Exceptions |
|
|
530 | |
|
Discovering Incidents Requiring Immediate Attention |
|
|
531 | |
|
Materiality of Exceptions |
|
|
533 | |
|
Developing Audit Opinions |
|
|
535 | |
|
Developing Audit Recommendations |
|
|
537 | |
|
Managing Supporting Documentation |
|
|
538 | |
|
|
541 | |
|
|
541 | |
|
Solicitation of Management's Response |
|
|
542 | |
|
|
543 | |
|
|
544 | |
|
|
544 | |
|
Final Sign-off with the Client |
|
|
544 | |
|
|
544 | |
|
Retesting the Previous Period's Failed Controls |
|
|
545 | |
|
Follow-up on Management's Action Plans to Remediate Control Failures |
|
|
545 | |
|
Client Feedback and Evaluations |
|
|
545 | |
Appendix B Popular Methodologies, Frameworks, and Guidance |
|
547 | |
|
Common Terms and Concepts |
|
|
547 | |
|
|
548 | |
|
Goals, Objectives, Strategies |
|
|
548 | |
|
|
549 | |
|
Capability Maturity Models |
|
|
550 | |
|
|
550 | |
|
|
553 | |
|
|
553 | |
|
Frameworks, Methodologies, and Guidance |
|
|
554 | |
|
COSO Internal Control Integrated Framework |
|
|
554 | |
|
|
558 | |
|
|
560 | |
|
|
561 | |
|
ISF Standard of Good Practice |
|
|
562 | |
|
|
562 | |
|
|
564 | |
|
|
565 | |
|
|
567 | |
|
|
568 | |
|
Pointers for Successful Use of Frameworks |
|
|
568 | |
|
|
570 | |
Appendix C About the CD |
|
571 | |
|
|
571 | |
|
Installing and Running MasterExam |
|
|
571 | |
|
|
571 | |
|
|
572 | |
|
|
572 | |
|
|
572 | |
|
|
572 | |
|
LearnKey Technical Support |
|
|
572 | |
Glossary |
|
573 | |
Index |
|
619 | |