Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying CISA – Certified Information Systems Auditor Study Guide
  • Table Of Contents Toc
CISA – Certified Information Systems Auditor Study Guide

CISA – Certified Information Systems Auditor Study Guide

By : Hemang Doshi
4.5 (61)
close
close
CISA – Certified Information Systems Auditor Study Guide

CISA – Certified Information Systems Auditor Study Guide

4.5 (61)
By: Hemang Doshi

Overview of this book

Are you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.
Table of Contents (19 chapters)
close
close
1
Section 1: Information System Auditing Process
4
Section 2: Governance and Management of IT
7
Section 3: Information Systems Acquisition, Development, and Implementation
10
Section 4: Information System Operations and Business Resilience
13
Section 5: Protection of Information Assets

Public key cryptography

Encryption is the process of converting data into an unreadable code so it cannot be accessed or read by any unauthorized person. This unreadable data can again be converted into readable form by a process of decryption. Different types of algorithms are available for encryption and decryption. In this section, we will look at various aspects of public key cryptography.

Let's understand the concepts of symmetric and asymmetric encryption and the difference between the two.

Symmetric encryption versus asymmetric encryption

Encryption can be of two types, that is, symmetric encryption or asymmetric encryption. The following table will help us to understand the difference between the two terms:

Symmetric Encryption Asymmetric Encryption
A single key is used to encrypt and decrypt the messages Two keys are used: one for encryption and another for decryption.
The Key is said to be symmetric because the encryption key is the same as the decryption key. Messages...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
CISA – Certified Information Systems Auditor Study Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon