Book Image

CISA – Certified Information Systems Auditor Study Guide - Second Edition

By : Hemang Doshi
5 (3)
Book Image

CISA – Certified Information Systems Auditor Study Guide - Second Edition

5 (3)
By: Hemang Doshi

Overview of this book

With the latest updates and revised study material, this second edition of the Certified Information Systems Auditor Study Guide provides an excellent starting point for your CISA certification preparation. The book strengthens your grip on the core concepts through a three-step approach. First, it presents the fundamentals with easy-to-understand theoretical explanations. Next, it provides a list of key aspects that are crucial from the CISA exam perspective, ensuring you focus on important pointers for the exam. Finally, the book makes you an expert in specific topics by engaging you with self-assessment questions designed to align with the exam format, challenging you to apply your knowledge and sharpen your understanding. Moreover, the book comes with lifetime access to supplementary resources on an online platform, including CISA flashcards, practice questions, and valuable exam tips. With unlimited access to the website, you’ll have the flexibility to practice as many times as you desire, maximizing your exam readiness. By the end of this book, you’ll have developed the proficiency to successfully obtain the CISA certification and significantly upgrade your auditing career.
Table of Contents (14 chapters)

Summary

In this chapter, you explored various aspects of business resiliency, including BIA, data backups, BCP and DRP plans, and testing methodologies. You also learned about various processes to evaluate an organization’s ability to continue business operations.

You have now acquired the relevant knowledge and skills required should business resilience appear in the CISA exam, along with a number of practical aspects like to derive RTO and RPO.

The following are some important points that you covered in this chapter:

  • A BIA determines the impact arising from the unavailability of each system. The more critical the system, the higher the impact. A BIA is conducted on the basis of input from the business process owner.
  • Once the critical applications have been identified through the BIA, the next step is to develop a strategy to recover the critical assets as soon as possible for the continuity of business operations. The BCP is the next step once the strategy...