Book Image

CISA – Certified Information Systems Auditor Study Guide

By : Hemang Doshi
Book Image

CISA – Certified Information Systems Auditor Study Guide

By: Hemang Doshi

Overview of this book

Are you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.
Table of Contents (19 chapters)
1
Section 1: Information System Auditing Process
4
Section 2: Governance and Management of IT
7
Section 3: Information Systems Acquisition, Development, and Implementation
10
Section 4: Information System Operations and Business Resilience
13
Section 5: Protection of Information Assets

End user computing

Here we will look at some of the important aspects of end user computing.

End user computing refers to a system wherein a non-programmer can create their own application. Various products are available to aid end users in designing and implementing systems according to their requirements without the help of programmers. From a user perspective, end user computing is a quick way to build and deploy applications without relying on an IT department. These applications are generally flexible and have the ability to quickly address any new requirements or modifications.

This also reduces pressure on the IT department, who can concentrate on more critical and complex applications.

The following are some of the inherent risks of end computing:

  • Applications, so developed, may not be subject to various tests and therefore carry a risk to information security in terms of data integrity, confidentiality, and availability.
  • Users may not adhere to change management and release...