ISACA - CISA review manual 2007 by Isaca

By Isaca

Книга ISACA - CISA evaluate handbook 2007 ISACA - CISA overview guide 2007Книги Компьютерная безопасность Автор: ISACA Год издания: 2007 Формат: pdf Страниц: 550 Размер: 25 Мб Язык: Английский0 (голосов: zero) Оценка:Подготовительные материалы к экзамену CISA.Общий объем 6 разделов (содержание в соответствии с требованиями экзамена). www.isaca.ruПрограмма сертификации CISAнаправлена на сертификацию специалистов в области управления информационной безопасностью, но имеют несколько разный фокус внимания. Программа CISA (Certified info safeguard Auditor) является одной из старейших и была принята в 1978 году. Она разработана и развивается организацией ISACA (Information process Audit and keep an eye on Association). Как ясно из названия, программа направлена на сертификацию аудиторов безопасности информационных систем. Напомним, что в задачу аудитора входит проверка соответствия политик безопасности компании требованиям законодательства, стандартам в области управления безопасностью и продекларированным бизнес-целям.Для получения сертификата CISA необходимо успешно пройти тестирование, в ходе которого проверяется наличие у кандидата знаний, необходимых аудитору. Они включают в себя знание методов организации аудита защищенности информационной системы предприятия, знание требований, на соответствие которым производится проверка, и знание документов, разрабатываемых на основе результатов аудита. Кроме того, кандидат должен иметь опыт работы в области аудита не менее five лет.

Show description

Read Online or Download ISACA - CISA review manual 2007 PDF

Best security books

Information Security Fundamentals (2nd Edition)

Constructing a knowledge safety application that clings to the main of safeguard as a company enabler needs to be step one in an enterprise’s attempt to construct an efficient protection application. Following within the footsteps of its bestselling predecessor, info safeguard basics, moment variation offers info safeguard execs with a transparent realizing of the basics of protection required to handle the diversity of matters they'll adventure within the box.

Firewalls For Dummies

What an grand international we are living in! nearly whatever you could think will be researched, in comparison, prominent, studied, and in lots of instances, obtained, with the press of a mouse. the net has replaced our lives, placing a global of chance ahead of us. regrettably, it has additionally placed a global of chance into the arms of these whose reasons are lower than honorable.

Security and Privacy Protection in Information Processing Systems

This ebook constitutes the refereed court cases of the twenty eighth IFIP TC eleven foreign details safety and privateness convention, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised complete papers offered have been conscientiously reviewed and chosen from eighty three submissions. The papers are prepared in topical sections on malware, authentication and authorization, community security/cryptography, software program protection, coverage compliance and tasks, privateness security, chance research and safety metrics, social engineering, and safety management/forensics.

Additional resources for ISACA - CISA review manual 2007

Sample text

Russell. , "Signaling System # 7", Second Edition, McGraw-Hili, New York. 1998. IS. Schneier, B.. "Applied Cryptography", Second Edition, John Wiley & Sons, New York, 1996. 16. html. 17. Stallings, W .. "ISDN: An Introduction", Macmillan Publishing Company, New York, 1989. 18. Stallings. W .. "Cryptography and Network Security", Second Edition, Prentice Hall PTR, Upper Saddle River, New Jersey, 1999. 19. Tanenbaum, A. , "Computer Networks" third Edition, Prentice Hall PTR, Upper Saddle River. New Jersey.

In this section we propose a solution to this problem. 1 RI}. A random value ni is generated for each recipient R i . vIi : message being sent from the originator 0 to the recipient Ri - I,; : key being selected by 0 - Ci = E ki (Mi) : encrypted message for Ri - ti = h(Mi' k) : label of message Mi - t : a timeout chosen by 0, before which the TTP has to publish some information - R : set of intended recipients - R': set ofrecipients that replied to the originator with the evidence of receipt - L' : labels of all the messages being sent to R' - E R' (k) : a group encryption scheme that encrypts k for the group R' - EOO i = So (feoo, Ri, ti, t, Vi, UR" cd : evidence of origin - EORi = SRi (feor, 0, ii, t, Vi, URi' Ci) : evidence of receipt of each Ri - SUbk = So(f sub, R', L', t, ER' (1,;)) : evidence of submission of the key to the TTP.

New Jersey, 1997. 5. Carne, E. B.. "Telecommunications Primer. Second Edition", Prentice Hall PTR, Upper 6. Chlamtac. I.. and Lin, Y .. "Wireless and Mobile Network Architectures", John Wiley & 7. Chow. M.. "Understanding Telecommunications: Systems, Networks and Applications", 8. Douskalis. B.. "IP Telephony", Prentice Hall PTR, Upper Saddle River, New Jersey, 9. Gallagher, M. D. , "Wireless Telecommunications Networking with Saddle River. New Jersey, 1999. Sons. New York, 200 I. Volume I. Andan Publisher, Holmdel, New Jersey, 2000.

Download PDF sample

Rated 4.05 of 5 – based on 26 votes