INDEX

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

4GLs, 226, 227

5G security, 526

802.1X standard, 488–489

A

abstraction, 324

ACCA (Association of Chartered Certified Accountants), 6

access. See also access controls

open, 488

remote access, 489–490, 578

service access, 483–484

subject access, 483–484

types of, 483–484

access administrator, 83

access bypass, 517

access control lists (ACLs), 500

access control policy, 31

access controls

client-server applications, 521

concepts, 484

considerations, 200

described, 500

logical. See logical access controls

managing, 460–461

models, 485

network, 488–489, 577–578

physical, 566–567, 582–583

relational databases, 306

service access, 483–484

subject access, 483–484

threats, 485–486

user, 570–571

vulnerabilities, 486–487

Wi-Fi, 343

work papers, 144

access logs, 461, 500–501, 556, 574

access management, 569–574

access points, 487–490, 578

access provisioning, 56–57

access violations, 570

account lockout, 511, 570, 572

accumulation of privileges, 59

ACLs (access control lists), 500

acquisitions, 98

activists, 475

addendums, terms for, 605

Address Resolution Protocol (ARP), 345–346

administrative audits, 129

administrative controls, 122

administrators, 557–558, 567, 568

advanced persistent threats (APTs), 552

agile development, 182, 222

agile manifesto, 190

AICPA (American Institute of Certified Public Accountants), 130, 599

ALE (annualized loss expectancy), 49

alerts, 579

American Institute of Certified Public Accountants (AICPA), 130, 599

American National Standards Institute (ANSI), 2

annualized loss expectancy (ALE), 49

annualized rate of occurrence (ARO), 49

ANSI (American National Standards Institute), 2

anti-malware. See also malware

administrative controls, 551–552

considerations, 481

management controls, 552

networks, 316–317, 519

technical controls, 553–555

application code review, 235

application controls, 245–251

auditing, 256–259

calculations, 249

considerations, 670

data file controls, 249–250

editing, 248–249

examples of, 671

input controls, 245–248

output controls, 250–251

processing controls, 248–250

processing errors, 250

reconciliation, 251

report distribution/receipt, 250–251

retention, 251

special forms, 250

application layer protocols, 354–356

application logic, 487

application programming languages, 209

application servers, 289, 360

applications. See also software

auditing, 258

client-server, 362–363, 521–522

cloud-based, 227–229

encryption, 544–545

financial considerations, 69–70

global Internet, 359–360

middleware, 363

networked, 362–363

vulnerabilities, 487

web-based, 363

whitelisting, 520

approved scanning vendor (ASV), 688

APTs (advanced persistent threats), 552

architecture review, 230, 576–577

architecture standards, 34

ARO (annualized rate of occurrence), 49

ARP (Address Resolution Protocol), 345–346

asset controls, 460–461

asset management, 42, 301, 457–459

asset owners, 450, 456

asset value (AV), 49

assets. See also information assets

auditing asset protection, 567–583

classification, 458–459

collecting/organizing data, 43–44

grouping, 41

hardware assets, 457–458

identifying, 41–44

information. See information assets

inventory, 457–458

policies/procedures, 451

sources of data, 42–43

split custody, 85

Association of Chartered Certified Accountants (ACCA), 6

ASV (approved scanning vendor), 688

Asynchronous Transfer Mode (ATM), 335–336

ATM (Asynchronous Transfer Mode), 335–336

attestations, 595–596

attribute sampling, 139

audit audience, 593

audit charters, 97–98, 606, 661

audit closure, 661–662

audit committees, 455, 658

audit cycle, 638–642

audit charters, 97–98, 606, 661

audit closure, 661–662

audit engagement, 603–606

audit follow-up, 663–664

audit objectives, 132, 614–615

audit opinions development, 647–649

audit recommendations development, 650

audit results delivery, 652–656

audit scope, 595, 615–616

considerations, 591

control testing activities, 632–647

developing audit plan, 613–616

developing test plan, 616–625

documentation management, 650–652

ethics/independence, 607–608

how audit cycle is discussed, 592–594

independent third party, 596

internal audits, 594, 597–600

management response, 656–661

organizing test plan, 627–630

overview, 594–595

planning. See audit planning

pre-audit activities, 625–627

project launch, 608–613

project origination, 595–603

resource planning, 631–632

terminology, 593–594

understanding, 592

audit engagement, 603–606, 659

audit evidence. See evidence

audit hooks, 144, 259

audit laws/regulations, 37, 38, 102–106, 597

audits, 37, 38, 102–106, 597

audit logs, 123, 201, 246, 306

audit management, 97–107

audit charter, 97–98, 606, 661

audit laws/regulations, 37, 38, 102–106, 597

audit planning. See audit planning

audit program, 98

implementing recommendations, 153

preliminary discussions, 609

reliance on work of other auditors, 141–142

staff disagreements, 646, 648, 655

technology, 101, 610

audit methodologies, 611–613

audit objectives, 595, 614–615

audit opinions, 647–649

audit planning, 98–100

audit contents, 127–128

audit procedures, 127

audit scope, 100, 127, 595, 615–616

changes in audit activities, 100

changes in technology, 99

developing audit plan, 613–616

factors affecting audit, 98–99

formal project planning, 131–134

market conditions, 99

mergers/acquisitions, 98

new organization initiatives, 98

for new project, 608–613

organization’s goals/objectives, 98

pre-audit planning, 132

purpose of audit, 127, 132

regulatory requirements, 99

resource planning, 100, 127–128

risk analysis. See risk analysis

schedule, 128

audit program, 98

audit projects. See projects

audit reports, 145–147. See also reports/reporting

additional deliverables, 660–661

audiences, 658–659

to audit committees, 658

considerations, 145, 146, 147, 656

contents, 145–146, 654–655

contributing to, 654

delivery of, 652, 660

distribution of, 604–605

electronic, 660

evaluating control effectiveness, 146–147

findings/recommendations, 146

interviewees, 146

preparation of, 133

recommendations, 657

reviewing draft, 659–660

signed, 660

structure, 145–146

from third-party auditors, 141–142

wording issues, 657

writing, 655–656

audit results delivery, 652–656

audit scope, 100, 127, 132, 595, 615–616

audit software, 144, 612

audit sponsors, 593

audit teams, 631–632, 635

auditing, 97–160. See also IS audits; testing

access logs, 574

access management, 569–574

administrative audits, 129

application controls, 256–259

applications, 258

asset protection, 567–583

audit follow-up, 663–664

audit goals, 98

audit laws/regulations, 37, 38, 102–106, 597

audit management, 97–107

audit objectives, 98, 128, 132

audit opinions, 647–649

audit planning. See audit planning

audit procedures, 127

audit recommendations, 146, 153

audit scope, 100, 127, 595, 615–616

audit subject, 132

automated work papers, 143–144

business continuity planning, 431–435

business controls, 256

change management, 255

checklists, 617, 661

closing procedures, 661–662

compliance audits, 129, 131

computer operations, 428

computer-assisted audits, 142–143

configuration management, 255

continuous auditing, 144–145, 258, 640–641

contracts, 89–90

controls and, 121–126

data analytics, 142–145

data entry, 429

database management systems, 425–426

design, 253

detecting fraud/irregularities, 147–148, 644–645

disaster recovery planning, 435–439

documentation. See documentation

employee terminations, 573–574

environmental controls, 580–581

evidence. See evidence

external audits, 100, 130, 663

feasibility studies, 252

feedback/evaluations, 662

file management, 428–429

file systems, 425

final sign-off, 662

financial audits, 129

forensic audits, 129

fraud audits, 129

implementation, 254–255, 602

incident management, 574–575

initial information requests, 613

integrated audits, 129

internal audits. See internal audits

interviewing key personnel, 434

investigative procedures, 574–575

IS audits, 129

IS hardware, 424

ISACA auditing standards, 4, 8–10, 107–115

IT governance, 86–91

IT infrastructure, 424–427

IT operations, 428–430

lights-out operations, 429

logical access controls, 568–576

methodologies, 131–134

monitoring operations, 430

network access controls, 577–578

network change management, 578–579

network infrastructure, 426–427

network operating controls, 427

network security controls, 576–580

objectives, 614–615

observing personnel, 138–139

operating systems, 424–425

operational audits, 128–129, 600

outsourcing, 90–91

password management, 571–572

performing an audit, 126–128

physical access controls, 582–583

physical security controls, 581–583

points of presence, 575–576

post-audit follow-up, 134

pre-audits, 130

preparing audit staff, 631–632

problem management operations, 429–430

procurement, 430–431

program management, 251–252

project management, 251–252

purpose of audit, 127, 132

recommendations, 650

re-performance, 138

requirements, 252

reviewing insurance coverage, 434–435

reviewing service provider contracts, 434

risk and. See risk entries

sampling, 139–141

security management, 567–568

service provider audits, 130

software development, 253–254

Systems Development Life Cycle, 251–255

technology and, 101

testing, 254

third-party risk management, 259–260

types of audits, 128–130, 132

user access controls, 570–571

user access provisioning, 572–573

vulnerability management, 579–580

walkthroughs, 618

wrap-up tasks, 134

auditors

auditor-auditee relationships, 153

communication plan, 133

considerations, 184, 269

ethics/independence, 607–608

handling conflicts, 655

IS auditors, 87, 115–118, 173, 487

IT auditors, 256–257, 434–435, 640

kickoff meetings, 635

objectivity, 145–146

passive observation, 138

project documentation and, 432–433

self-assessments, 152–153

staff, 655

third-party, 141–142

walkthrough interviews, 137–138

authentication

bypassing, 570

network-based, 316

overview, 200, 491

problems, 513

remote access and, 489

user access, 570

Wi-Fi networks, 343

authorization, 200, 246, 247, 491–492

automated testing, 641–642

automated work papers, 143–144

automatic controls, 124, 636

AV (asset value), 49

availability management, 280

B

back doors, 486, 501–502

background verification, 54–55

backup/recovery, 419–423

backup media rotation, 420–421

backup schemes, 420

backup to tape/other media, 419–420

backup tools, 501–502

destruction of, 423

encryption, 423

lost/damaged data, 501

media inventory, 502

media storage, 422–423, 501–502

off-site backups, 422–423

records of, 423

balanced scorecard (BSC), 20, 22–23

batch totals, 218

BCI (Business Community Institute), 401

BCM Institute, 402

BCP (business continuity planning), 364–402

auditing, 431–435

best practices, 401–402

components of, 392–393

considerations, 50, 75

continuity plans, 377–393, 399

disasters. See disaster entries

improving recovery/continuity plans, 399

interviewing key personnel, 434

key recovery targets, 377

maintaining recovery/continuity plans, 390, 400, 401

overview, 364

personnel safety procedures, 378–379

planning process, 371–377

project documentation and, 432–433

recovery procedures, 386–387

restoration procedures, 387–388

reviewing prior test results/action plans, 433

testing recovery/continuity plans, 393–399

training personnel, 386, 399

BCP documentation, 399–400

BCP life cycle, 371, 372

BCP policy, 371–372

benchmarking, 67, 76, 239–240

benefits realization, 162–167

BIA (business impact analysis), 372–375

big data architect, 81

biometrics, 496–499, 512–513

blade computers, 297

Bluetooth technology, 344

BMIS (Business Model for Information Security), 673–674

board of directors, 23, 78, 455

bots, 527, 549

BPLC (business process life cycle), 237–240

BPM (business process management), 237

BPR (business process reengineering), 237–239

BSC (balanced scorecard), 20

budgets, 612

buses, 292–293

business alignment, 19, 456

business case development, 165–166

Business Community Institute (BCI), 401

business continuity, 25, 75

business continuity planning. See BCP

business continuity requirements, 201

business controls, 256

business impact analysis (BIA), 372–375

Business Model for Information Security (BMIS), 673–674

Business Motivation Model, 667

business objectives, 667

business plan, 197

business process life cycle (BPLC), 237–240

business process management (BPM), 237

business process reengineering (BPR), 237–239

business processes, 237–243

changes to, 195

evaluating for risk, 118–119

impact on, 100

overview, 237

as a service, 69

business records, 118

business resilience, 364–423

business risks, 119–120

C

CA (criticality analysis), 375–376

CAATs (computer-assisted audit techniques), 142–143, 258–259

cables/cabling, 329–333

CAE (chief audit executive), 593

California Consumer Privacy Act (CCPA), 104

campus area network (CAN), 314

CAN (campus area network), 314

Canadian regulations, 106

Capability Maturity Model Integration (CMMI), 75

capability maturity models (CMMs), 240–242, 668–670

capacity management, 75–76, 279–280

career paths, 57

CASB (cloud access security broker), 316, 577

CASE (computer-aided software engineering), 226–227

categorizations, 647

CCO (chief compliance officer), 80, 593

CCPA (California Consumer Privacy Act), 104

CCTA (Central Computer and Telecommunications Agency), 692

Center for Internet Security (CIS), 689–690

Central Computer and Telecommunications Agency (CCTA), 692

central processing unit (CPU), 291–292

certificates, 512–513

certification. See CISA certification

Certified in Risk and Information Systems Control (CRISC) certification, 2

Certified in the Governance of Enterprise IT (CGEIT) certification, 2, 667

Certified Information Systems Auditor. See CISA entries

CFO (chief financial officer), 593

CGEIT (Certified in the Governance of Enterprise IT) certification, 2, 667

chain of custody, 482, 644

change control board, 274

change management

auditing, 255

client-server applications, 521–522

components, 234–235

overview, 184–185, 273

process for, 69, 273–274

records, 274–275

unauthorized changes, 235–236

change request, 234

change review, 234

chargeback, 70

Chartered Institute of Management Accountants (CIMA), 6

charters

audit charter, 97–98, 606, 661

considerations, 118

described, 40

program charter, 163

steering committee, 28

checklists, 617, 661

checksums, 218

chief audit executive (CAE), 593

chief compliance officer (CCO), 593

chief financial officer (CFO), 593

chief information officer (CIO), 24, 25, 80, 455, 593

chief information risk officer (CIRO), 455

chief information security officer (CISO), 24, 25, 31, 80, 455

chief privacy officer (CPO), 80, 455

chief risk officer (CRO), 80, 593

chief security officer (CSO), 24, 80

chief technical officer (CTO), 80

CIMA (Chartered Institute of Management Accountants), 6

CIO (chief information officer), 24, 25, 80, 455, 593

cipher locks, 564–566

CIRO (chief information risk officer), 455

CIS (Center for Internet Security), 689–690

CIS (continuous and intermittent simulation), 144–145, 259

CIS Controls, 73, 689–690

CIS CSC, 689–690

CISA (Certified Information Systems Auditor)

becoming, 1–18

code of professional ethics, 4, 8

experience substitution/waiver options, 4, 6–7

overview, 1–2

work experience requirements, 5–6

CISA certification

applying for, 4, 13–14

benefits of, 2–3

considerations, 2, 7

continuing education, 5, 14–17

life cycle, 4

overview, 1–2

process for, 4–7

retaining, 14–17

revocation of, 17

CISA certification exam, 10–13

after the exam, 13

considerations, 4

day of exam, 13

passing score, 4

practice areas, 5

preparation pointers, 17

resources for, 11–12

CISC (complex instruction set computer), 292

CISO (chief information security officer), 24, 25, 31, 80, 455

classes, 224

classful networks, 350–351

classless networks, 351

cleaning, 564

client organization, 593

clients

client needs, 608–610

client procedures, 617–618

considerations, 594

defined, 593

feedback/evaluations, 662

final sign-off with, 662

internal auditing and, 594

preparedness for an audit, 613–614

project planning with, 632

reports to, 658–659

client-server applications, 362–363, 521–522

cloud access security broker (CASB), 316, 577

cloud computing, 302

cloud, public, 411

cloud sites, 410, 412–413

cloud-based infrastructure/applications, 227–229

cloud-based services, 316

clusters, 297, 302, 416, 417

CM (configuration management), 184, 236–237, 255, 275

CMDB (configuration management database), 236, 275

CMMI (Capability Maturity Model Integration), 75

CMMs (capability maturity models), 240–242, 668–670

COBIT, 667, 668–670

COBIT framework, 21, 73, 75–76, 125, 372, 667, 668, 678–680

COCOMO (Constructive Cost Model), 176

code of ethics, 4, 8, 107

cold sites, 409–410, 412

collision detection, 333–334

Committee of Sponsoring Organizations of the Treadway Commission. See COSO

communication plan, 133

communications, 391–392

compensating controls, 123, 489, 515, 621–622

compensation baselining, 79

complex instruction set computer (CISC), 292

compliance, 25, 454, 469

compliance audits, 129

compliance management, 74

compliance risk, 52–53

compliance testing, 131

component-based development, 224–225

computer crime, 471–476, 575

computer operations. See operations

computer security/privacy regulations, 102–106

computer-aided software engineering (CASE), 226–227

computer-assisted audit techniques (CAATs), 142–143, 258–259

computers. See also IS hardware

firmware, 296

hardware architecture, 290–300

multicomputer architectures, 297–298

storage, 293–296, 301

types of, 288–289

uses for, 289–290

confidence coefficient, 140

confidence level, 140

confidentiality, 469

configuration management (CM), 184, 236–237, 255, 275

configuration management database (CMDB), 236, 275

configuration standards, 34

Constructive Cost Model (COCOMO), 176

continuing professional education (CPE), 5, 14–17

continuous and intermittent simulation. See CIS entries

continuous auditing, 144–145

contractor management, 59, 79–84

contracts, 89–90, 136, 434

control activities/controls, 648–649, 670

control existence, 635–638

control language, 627

control managers, 593, 635

control objectives

considerations, 622, 670

developing, 621

failures, 620

internal, 124–125

opinions on, 648–649

outdated, 620

overview, 620–621, 667

control operating effectiveness, 638–642

control owners, 593, 635, 636, 639

control risk, 148

control self-assessment. See CSA

control testing, 592, 598, 636, 663–664. See also auditing

control testing activities, 632–647

controls, 121–126. See also access controls

absence of, 638

administrative controls, 122

application. See application controls

asset controls, 460–461

automatic controls, 124, 636

business controls, 256

categories of, 124

changes to IT environments, 619–620

CIS Controls, 73, 689–690

classes of, 122–123

classification, 121–124

compensating controls, 123, 489, 515, 621–622

considerations, 620–621

corrective controls, 123

data file controls, 249–250

described, 121

detective controls, 122, 123

deterrent controls, 123

documenting, 671

environmental. See environmental controls

establishing testing cycles, 598–599

evaluating effectiveness of, 146–147

failures, 620, 649

general controls, 126, 670–671

governance, 636

identifying, 622–632, 671

input controls, 245–248

internal control objectives, 124–125

internal controls, 670

IS control objectives, 125

IS controls, 126

IT GC, 681

key controls, 621

logical access. See logical access controls

manual controls, 124

mapping to documentation, 624–625

network security. See network security controls

outdated, 620

output controls, 250–251

overview, 670–671

physical controls, 121, 122

physical security controls, 564–567

preventive controls, 122, 123

processing controls, 248–250

recovery controls, 123

reviewing existing controls, 599

SOD controls, 85

supporting controls, 621, 622

technical controls, 121, 122

types of, 121–122

understanding, 622–632

understanding client’s procedures, 617–618

understanding IT environment, 618–619

controls analyst, 82

controls environment, 617–625

controls management, 72–73

corporate governance, 666–667

corrective controls, 123

corroboration, 635

corroborative inquiry, 637

COSO (Committee of Sponsoring Organizations of the Treadway Commission), 21, 674–678

COSO cube, 675 (more)

COSO Internal Control – Integrated Framework, 674–678

CPE (continuing professional education), 5, 14–17

CPM (critical path methodology), 179–182

CPO (chief privacy officer), 80, 455

CPU (central processing unit), 291–292

criminal activity, 644–645

CRISC (Certified in Risk and Information Systems Control) certification, 2

critical path methodology (CPM), 179–182

Critical Security Controls (CSC), 689–690

criticality analysis (CA), 375–376

CRO (chief risk officer), 80, 593

cryptography, 533–539, 540

cryptosystems, 533, 535–537

CSA (control self-assessment), 150–153

CSA life cycle, 151–152

CSC (Critical Security Controls), 689–690

CSF (NIST Cybersecurity Framework), 242

CSO (chief security officer), 24, 80

CTO (chief technical officer), 80

customer confidence, 3

customer requirements, 195

customers, 389

cutover test, 218–219, 398

cybercrime, 471–476, 575

Cybersecurity Framework (CSF), 242

cyclical controls testing, 598, 654

D

DAC (Discretionary Access Control), 485

data. See also information

classification, 458–459

destruction of, 32

forensics techniques, 482–483

life cycle, 286–287

offshore data flow, 103

ownership, 568

quality management, 287

stealing, 522

storage, 36–37

structured/unstructured, 36

validation of, 200

data analytics, 142–145

data center reliability, 563–564

data classification policy, 30–31

data communications software, 303. See also networks

data custodians, 568

data entry personnel, 83

data file controls, 249–250

data flow diagrams (DFDs), 36

data integrity, 257

data loss prevention. See DLP

data management, 81, 286–287

data manager, 81

data migration, 217–218

data protection laws, 522

data storage diagrams, 36–37

database administrator (DBA), 81

database analyst, 81

database architect, 81

database management system (DBMS), 143, 304–307, 425–426

database servers, 289

databases

CMDB, 275

hierarchical databases, 307, 308

network databases, 307, 308

NoSQL databases, 306

object databases, 306

RDBMS, 305–306

data-oriented system development (DOSD), 223

DBA (database administrator), 81

DBMS (database management system), 143, 304–307, 425–426

DDoS attacks, 477

debugging, 143, 210–211

defense-in-depth, 344, 510, 549, 553

Deming Cycle, 671–672

Deming, W. Edwards, 671–672

denial-of-service (DoS) attacks, 477

department charters, 136

design

auditing, 253

infrastructure, 231–232

release process, 276–278

SDLC, 206–208

destructware, 477, 549

detection risk, 148

detective controls, 122

deterrent controls, 123

developers, 184

development, 277

devices

mobile, 32, 290–291, 514–515

network devices, 334–335

replacing, 513

TCP/IP devices, 356–357

WAN devices, 341–342

DevOps, 194, 221–222

DevSecOps, 222

DFDs (data flow diagrams), 36

digital certificates, 496

digital envelopes, 540–541

digital laws/regulations, 102

digital rights management (DRM), 310–311

digital signatures, 540

digital transformation (DX), 25, 166, 269

directories, 303, 315

disaster recovery, 25

disaster recovery planning (DRP), 74, 403–423

acquiring hardware, 412–413

auditing, 435–439

data backup/recovery, 419–423

developing recovery plans, 418–419

developing recovery strategies, 406–418

evaluating off-site storage, 438

overview, 403

recovery objectives, 403–406

recovery/resilience technologies, 413–417

response team roles/responsibilities, 403

reviewing test results/action plans, 433, 437

risk analysis and, 50

site recovery options, 407–413

testing disaster response plans, 423

third-party recovery sites, 411–412

disaster recovery plans, 618–619

disaster requirements, 202

disasters, 364–371

business continuity and, 364–365, 371

considerations, 364–365

disaster declaration procedures, 379–380

effect on organizations, 370–371

first responders, 382

human-made, 368–369

natural, 365–368

overview, 364–365

physical security, 384

responsibilities, 381–386

types of, 365–369

discovery sampling, 140

Discretionary Access Control (DAC), 485

distributed denial-of-service (DDoS) attacks, 477

DLP (data loss prevention), 520, 554, 577

DLP systems, 556

DNS (Domain Name System), 359, 360, 518

DNS attacks, 517

DNS servers, 360

document review test, 395

documentation

auditing, 87–89

BCP documents, 432–433

business continuity planning, 432–433

checklists, 617, 661

client procedures, 617–618

creating, 623–624

diagramming, 623, 624

disaster recovery plans, 618–619

disaster response operations, 383

draft, 624

electronic, 651–652

employee policy manuals, 55–56

financial audit write-ups, 617

formats, 623

hard copy, 400

instruction manuals, 617

internal audits, 617

IS standards documents, 136

lead sheets, 612, 652, 653

management procedures, 617, 618

managing supporting documentation, 650–652

mapping controls to, 624–625

network/system diagrams, 618

policies, 28

previous audits, 618

processes/procedures, 623–625

project documentation, 183–184

project management, 183–184

project records, 182–183

recovery documentation, 400

sections, 651

soft copy, 400

standard operating procedures, 32–33

storing, 651–652

system documentation, 137

system information, 137

system inventories, 618

technology, 618–619

test results, 398–399

Domain Name System. See DNS

domain names, 575

DoS attacks, 477, 517

DOSD (data-oriented system development), 223

DRI International, 402

DRM (digital rights management), 310–311

DRP. See disaster recovery planning

due diligence, 243–244

DX (digital transformation), 25, 166, 269

E

EA (enterprise architecture), 34–37, 311–312

eavesdropping, 485–486, 488, 516, 523, 527

ECC (elliptic curve cryptography), 538

education, 5, 6–7, 14–17

EF (exposure factor), 49

effectiveness measurement, 26

electric power, 557, 558–560

electronic documentation, 651–652

elliptic curve cryptography (ECC), 538

e-mail, 315, 360, 517, 550

emergencies, 390

emergency changes, 274–275

emergency response, 382

emergency supplies, 391

employee development, 57

employee policy manuals, 55–56

employees. See also personnel management

acceptable behavior, 451

access provisioning, 56–57

background verification, 54–55

career advancement, 79, 80

career paths, 57

compensation baselining, 79

contractors, 59, 79–84

disgruntled, 476

duties, 469

employment agreements, 469–470

equipment issued to, 470

former, 476

hiring, 54–57

insourcing, 60

interviewing key personnel, 434

job rotation, 556

job titles/descriptions, 57, 79–84, 469

mandatory vacations, 58

moonlighting, 32

new, 572–573

observing, 138–139

outsourcing, 60–67

passive observation of, 138

performance evaluation, 57

policy/discipline, 470

reassignments, 59

recruiting, 79

roles/responsibilities, 78–79, 450, 454–456

safeguards during employment, 470–471

safety procedures, 378–379

screening/background checks, 468–469, 470, 556

security awareness, 24, 138, 451–453, 470

segregation of duties. See segregation of duties

skills/experience, 138

split custody, 484

staff augmentation, 603

staff disagreements, 646, 648, 655

tasks performed, 138

termination of. See terminations

training. See training

transfers, 59, 460, 470, 471, 510

vacations, 58

walkthroughs, 137–138

encapsulation, 224, 324

encryption, 532–545

applications, 544–545

backups, 423

Bluetooth, 344

cryptography, 533–539, 540

digital envelopes, 540–541

digital signatures, 540

hashing, 539–540

key management, 542–544

logical access controls, 532–545

networks, 519

overview, 532–533

PKI, 541–542

relational databases, 306

remote access and, 489

requirements, 200

secure key exchange, 536

sensitive information, 474

terms/concepts, 533–535

wireless networks, 343, 524

work papers, 144

encryption applications, 544–545

end users, 172

endpoints, 290–291

end-user computing, 282–283

engagement letters, 603–606, 608, 614–616

enterprise architecture (EA), 34–37, 311–312

Enterprise governance, 666–667

environmental controls, 557–564

audit audience, 580–581

auditing, 580–581

countermeasures, 558–564

electric power, 557, 558–560

threats/vulnerabilities, 552–558

equipment, 470–471, 478

equipment control/use, 32

equipment theft, 477

error handling, 248

error rates, 140, 141

errors, 148, 149, 250

Ethernet, 333–335

ethical hackers, 602

ethics, 607–608

ethics, code of, 4, 8, 107

European regulations, 106

General Data Protection Regulation (GDPR), 52–53, 99, 104

e-vaulting, 502

evidence, 134–141

chain of custody, 644

characteristics of, 135–136

of fraud/criminal activity, 147–148, 644–645

gathering, 136–138, 632–634

of irregularities, 147–148

lack of, 619

listed, 146

objective, 135

timing, 135

evidence provider, 135

exam. See CISA certification exam

exception handling, 281

exceptions, 646–647, 655

executive management, 78, 455

executive support, 450

expected error rate, 140

expenses, 605

exposure factor (EF), 49

external attestations, 595–596

external audits, 100, 130, 663

extreme programming (XP), 191–192

F

fail open/fail close, 484

failovers, 297, 302, 416

FAM (file activity monitoring), 236

FDDI (Fiber Distributed Data Interface), 337–338

feasibility studies

auditing, 252

business case development, 165

considerations, 165, 196, 431

items included in, 196–197

overview, 165, 196

release process, 276

SDLC, 194, 196, 261

Federal Information Security Management Act (FISMA), 598

fees, 605

FEMA, 402

Fiber Distributed Data Interface (FDDI), 337–338

file activity monitoring (FAM), 236

file integrity monitoring (FIM), 236

file management, 428–429

file servers, 289, 315

file systems, 303–304, 425

files, 303

FIM (file integrity monitoring), 236

financial audits, 129, 617

financial crime, 473–474

financial management, 42, 69–70, 278–279

fire prevention/detection/suppression, 561–563

firewalls, 357, 577, 637

firmware, 296

FISMA (Federal Information Security Management Act), 598

folders, 303

forensic audits, 129

forensic investigations, 482–483, 575

forensic rules, 645

FPA (function point analysis), 177

FPs (function points), 177

Frame Relay, 340–341

frameworks, 21, 665, 668, 670, 699

fraud, 147–148, 644–645

fraud audits, 129

FTP, 354

FTPS, 354

function point analysis (FPA), 177

function points (FPs), 177

functional requirements, 197–198, 231

functional testing, 214

functions, 242

G

GAIT (Guide to the Assessment of IT Risk), 681

Gantt chart, 179

GAS (generalized audit software), 144

gate processes, 278

gateway servers, 289

gateways, 350

GCCs (general computing controls), 126

GDPR (General Data Protection Regulation), 52–53, 99, 104

general computing controls (GCCs), 126

general controls, 670–671

generalized audit software (GAS), 144

GLBA (Gramm-Leach-Bliley Act), 52, 53, 99

global Internet applications, 358–360

Global Technology Audit Guides (GTAG), 680

goals, 98, 99, 128, 667

Good-Cheap-Fast triad, 183

governance. See also IT governance

defined, 19

information security governance, 23–26

outsourcing, 66–67

overview, 666–667

governance controls, 636

Gramm-Leach-Bliley Act (GLBA), 52, 53, 99

grid computing, 297, 302

GTAG (Global Technology Audit Guides), 680

guard dogs, 567, 582

Guide to the Assessment of IT Risk (GAIT), 681

Guide to the Project Management Body of Knowledge (PMBOK Guide), 693–695

guidelines, 107, 111, 115, 692

H

hackers, 475, 476, 602

hardening, 481, 487, 503, 504–507, 579

hardware. See IS hardware

hashing, 539–540

Health Insurance Portability and Accountability Act (HIPAA), 73, 99

helpdesk, 271

helpdesk analyst, 83

HIPAA (Health Insurance Portability and Accountability Act), 73, 99

hiring, 54–57

hot sites, 408–409, 412

human resources. See also personnel management

contractor management, 59, 79–84

employee terminations. See terminations

employee transfers, 59, 460, 470, 471, 510

security, 467–471

I

IaaS (Infrastructure-as-a-Service), 2, 68–69, 228

IAs. See internal audits

ICMP (Internet Control Message Protocol), 320–321, 347, 348

identification, 491

identity and access management, 74

IDEs (integrated development environments), 226

IDSs (intrusion detection systems), 481, 519, 570

IEC (International Electrotechnical Commission), 682–684

IGMP, 347

IIA (Institute of Internal Auditors), 597

impact analysis, 47–48, 376

implementation, 215–219

auditing, 254–255

cutover test, 218–219

described, 234

planning, 215–216

post-implementation, 219–220, 255

training, 217

incident logs, 136

incident management

auditing, 574–575

considerations, 275

overview, 74, 272

incident response

overview, 25, 453–454

phases, 478–479

planning, 478, 480

testing, 480

incidents. See security incidents

independence issues, 607–608

information. See also data

considerations, 449

described, 457

personal, 461–462

protecting, 500–507

sensitive, 461–462, 474–475

information assets. See also assets

categories, 457

collection/use of, 103

considerations, 42

data classifications, 458

handling procedures, 458–459

protecting, 449–589

information leakage, 555–556

Information Security Forum (ISF), 682–684

information security governance, 23–26

information security management, 449–483

aspects of, 450–454

asset controls, 460–461

asset inventory/classification, 457–459

business alignment, 456

compliance, 454, 469

computer crime, 471–476, 575

corrective/preventive actions, 454

executive support, 450

forensic investigations, 482–483

human resources security, 467–471

incident response, 454

overview, 449

policies/procedures, 450–451

privacy, 461–462

roles/responsibilities, 450, 454–456, 469

security awareness, 451–453, 470

security incidents. See security incident management

security monitoring/auditing, 453

third-party management, 462–467

Information Security Management System (ISMS), 674

information security policy, 29

information system support, 118

information systems. See IS; IT entries

Information Systems Audit and Control Association. See ISACA entries

Infrared Data Association (IrDA), 345

infrastructure

architecture review, 230

design, 231–232

development/implementation, 229–234

implementation, 234

maintenance, 234

procurement, 232–233

requirements, 231

testing, 233

Infrastructure-as-a-Service (IaaS), 2, 68–69, 228

inherent risk, 148

inheritance, 224

innovation, 195

input authorization, 246, 247

input controls, 245–248

input validation, 246–247

inquiry, 635, 637

insourcing, 60

inspection, 635, 637, 638–639

instant messaging, 360, 518

Institute of Internal Auditors (IIA), 597

insurance, 150

insurance coverage, 434–435

integrated audits, 129

integrated development environments (IDEs), 226

Integrated Services Digital Network (ISDN), 341

integrated test facility (ITF), 144, 259

integrity, 102, 257

intellectual property, 32

internal auditors. See clients

internal audits (IAs), 597–600

controls review, 599

controls testing, 597–599, 663–664

documentation, 617

new, 100

operational audits, 600

overview, 130, 597

risk assessment, 597

voluntary, 151

internal controls, 670

International Electrotechnical Commission (IEC), 682–684

International Organization for Standardization (ISO), 682–684

Internet communications, 526–532

Internet Control Message Protocol (ICMP), 320–321, 347, 348

Internet layer protocols, 346–349

Internet points of presence, 575–576

Internet Protocol. See IP

interoperability, 231

intrusion detection systems (IDSs), 481, 519, 570

intrusion prevention systems (IPSs), 357, 519, 554, 570

inventories, system, 618

investigative procedures, 574–575

I/O operations, 296–297

IoT security, 520–521

IP (Internet Protocol), 346–347

IP addresses, 349, 352, 358–359

IPsec, 347–349

IPSs (intrusion prevention systems), 357, 519, 554, 570

IPv4, 349–352, 353

IPv6, 352–353

IrDA (Infrared Data Association), 345

irregularities, 147–148

IS (information systems)

architecture, 301–311

code of professional ethics, 4, 8

considerations, 7, 457

hardware, 287–301

IS vs. IT, 7

maintaining, 234–237

operations. See IS operations

software, 303–304

IS audit cycle. See audit cycle

IS auditors, 87, 115–118, 173, 487. See also auditors

IS audits, 129, 591–664. See also auditing

IS control objectives, 125

IS hardware, 287–301. See also computers

architecture, 290–300

auditing, 424

computer usage, 288–290

configuration, 275

for disaster recovery, 412–413

hardware asset inventory, 457–458

information systems, 287–301

maintenance, 300

monitoring, 300–301

overview, 287

IS operations, 270–287. See also IT operations

data management, 286–287

end-user computing, 282–283

hardware. See IS hardware

IT service management, 271–280

media control, 285–286

operations management/control, 270–271

overview, 270

quality assurance, 284–285

security management, 285

software program library, 283–284

IS standards documents, 136

ISACA audit and assurance guidelines, 111–115

ISACA audit and assurance standards framework. See ITAF

ISACA auditing standards, 4, 8–10, 107–115

ISACA chapter, 17

ISACA Code of Professional Ethics, 4, 8, 107

ISACA online glossary, 666

ISACA Risk IT Framework, 117

ISACA training/conferences, 101

isaca.org web site, 2, 17

ISDN (Integrated Services Digital Network), 341

ISF (Information Security Forum), 682–684

ISMS (Information Security Management System), 674

ISO (International Organization for Standardization), 682–684

ISO/IEC 9000, 71

ISO/IEC 20000, 71, 73

ISO/IEC 27001, 21, 75, 682–684

ISO/IEC 27002, 73, 682–684

ISO/IEC 38500, 21

ISO/IEC standard, 2, 3, 241, 272, 682–684

IT Assurance Framework. See ITAF entries

IT auditors, 256–257, 434–435, 640. See also auditors

IT balanced scorecard (IT-BSC), 23

IT environments, changes to, 619–620

IT GC (IT general controls), 681

IT general controls (IT GC), 681

IT governance, 20–26

activities, 20–21

auditing, 86–91

balanced scorecard, 22–23

considerations, 667

executive practices, 2026

frameworks, 21

overview, 19–20

problems in, 86–87

security activities, 25–26

IT Governance Institute (ITGI), 666

IT infrastructure, 424–427

IT Infrastructure Library. See ITIL entries

IT life cycle management, 161–267. See also Systems Development Life Cycle

application controls, 245–251

auditing application controls, 256–259

auditing business controls, 256

auditing third-party risk management, 259–260

benefits realization, 162–167

business processes, 237–243

infrastructure, 229–234

maintaining information systems, 234–237

overview, 161–162, 666

project management. See project management

third-party management, 243–245

IT management, 53–86

change management. See change management

controls management, 72–73

performance management, 75–76

personnel. See personnel management

portfolio management, 72

quality management, 70–72

security management, 72–73

sourcing, 60–67

third-party delivery management, 67–69

IT management practices, 53–86

IT operations, 173, 281, 428–430. See also IS operations

IT organizations, 269

IT outsourcing, 2

IT service desk, 271

IT service management (ITSM), 271–280, 692

IT standards, 33–34

IT steering committee, 24, 27–28, 172

IT strategic planning, 26–28

IT strategy committee, 22

IT Value Delivery (Val IT) framework, 72, 698–699

ITAF (IT Assurance Framework), 8–9, 97, 107–110, 691

ITAF project, 691–692

IT-BSC (IT balanced scorecard), 23

ITF (integrated test facility), 144, 259

ITGI (IT Governance Institute), 666

ITIL (IT Infrastructure Library), 668, 692–693

ITIL framework, 21

IT/IS governance reviews, 602–603

ITSM (IT service management), 271–280, 692

J

job titles/descriptions, 57, 79–84, 469

judgmental sampling, 139

jump servers, 571, 578

K

Kanban, 190–191

key controls, 621–622

key logging, 551–552

key management, 542–544

key measurements, 71

key performance indicators (KPIs), 22–23, 75, 167

keycard systems, 582

keycards, 565, 566

kilo lines of code (KLOC), 175–176

KLOC (kilo lines of code), 175–176

known error, 272

KPIs (key performance indicators), 22–23, 75, 167

L

L2TP (Layer 2 Tunneling Protocol), 346

LAN (local area network), 314, 328–338

laptop computers, 290, 514–515

law enforcement, 475

laws/regulations, 37–38. See also standards

changes in regulation, 194–195

compliance, 52–53

computer security/privacy, 102–106

determining applicability of, 104

digital media, 102

identifying, 37–38

overview, 37–38

penalties for failing to comply, 103

policies/procedures, 451

privacy, 102–106

risk management, 451

security, 102–106

Layer 2 Tunneling Protocol (L2TP), 346

Layer 3 switch, 357

Layer 4 switch, 357

Layer 4-7 switch, 357

lead sheets, 612, 652, 653

least privilege, 236, 484, 500

legal agreements, 195, 465–466

legal issues, 383, 604, 645

legal protection, 648

life cycle. See IT life cycle management

lighting, 564

lights-out operations, 429

link layer protocols, 345–346

local area network (LAN), 314, 328–338

log files

access logs, 461, 500–501, 556, 574

audit logs, 123, 201, 246, 306

considerations, 639

incident logs, 136

system logs, 638

transaction logs, 250

logic bombs, 486

logical access controls, 483–515. See also access controls

access control concepts, 484–486

access control vulnerabilities, 486–487

access points, 487–490

asset protection, 567–581

auditing, 568–576

client-server applications, 521–522

encryption, 532–545

environmental controls, 557–564

information leakage, 555

Internet, 526–532

IoT security, 520–521

malware, 548–555

mobile computing, 514–515

network security controls, 516–520

overview, 483–484

PBX, 547–548

physical security controls, 564–567, 581–583

protecting stored information, 500–508

user access, 508–514

voice over IP, 545–547

wireless networks, 522–526

logical controls, 121

Long Term Evolution (LTE), 344

LTE (Long Term Evolution), 344

M

MAC (Mandatory Access Control), 485

MAC (Media Access Control), 346

malware, 548–555. See also anti-malware

considerations, 477, 517, 552, 553

described, 477, 485

exposure to, 488

Internet communications, 527

network, 316–317

overview, 548

threats/vulnerabilities, 548–552

types of, 548–549

vulnerabilities, 550

MAN (metropolitan area network), 314

management, improper actions by, 645–646

management procedure documentation, 617, 618

management projects, 664

management representation letter, 648

management review, 186

managers, 24, 78, 456

Mandatory Access Control (MAC), 485

mandatory vacations, 58

man-in-the-browser (MITB) attacks, 517

man-in-the-middle (MITM) attacks, 517

manual controls, 124

market competition, 100

market conditions, 99

materiality, 148–149, 646–647

matrix, 147, 627. See also test plans

maturity models, 668–670

maximum tolerable downtime (MTD), 376–377

MDM (mobile device management), 515

Media Access Control (MAC), 346

media control, 285–286

media management systems, 307–308

media manager, 83

media storage, 501–502

media storage sites, 435

memory, 296

mergers, 98

message boards, 518

message digests, 539–540

methodology standards, 34

methods, 224

metrics, 166

metropolitan area network (MAN), 314

MFA (multifactor authentication), 495–496

middleware, 363

military, 475

mission statement, 118

MITB (man-in-the-browser) attacks, 517

mitigating risk, 51, 65–66, 120, 150

mitigation strategies, 50

MITM (man-in-the-middle) attacks, 517

mobile computing, 514–515

mobile device management (MDM), 515

mobile devices, 32, 290–291, 514–515

mobile sites, 410

modems, 341, 578

monitoring

auditing, 430

continuous monitoring, 640–641

hardware, 300–301

overview, 121, 281–282

security monitoring, 282, 453

MPLS (Multiprotocol Label Switching), 339

MTD (maximum tolerable downtime), 376–377

multicast, 347

multifactor authentication (MFA), 495–496

multiplexors, 341

Multiprotocol Label Switching (MPLS), 339

N

NACs (network access controls), 488–489, 577–578

NAS (network attached storage), 414

NDAs (nondisclosure agreements), 606

Near-Field Communications (NFC), 345

netflow, 520

network access controls (NACs), 488–489, 577–578

network access paths, 569

network administrator, 82

network architect, 82

network attached storage (NAS), 414

network change management, 578–579

network connectivity, 297, 316, 416–417

network devices, 334–335

network engineer, 82

network identifier, 343

network infrastructure, 311–363

architecture, 312–314

auditing, 426–427

enterprise architecture, 311–312

network models, 317–327

network technologies, 328–363

network-based services, 315–317

overview, 311

network management, 82, 317, 360–361

network management tools, 361

network models, 317–327

OSI model, 317–323

TCP/IP model, 323–327

network operating controls, 427

network routing, 359

network security, 516–520

5G security, 526

client-server applications, 521–522

countermeasures, 518–520

encryption. See encryption

Internet communications, 526–532

IoT security, 520–521

network-based threats, 516–518

vulnerable network services, 517–518

wireless networks, 522–526

network security controls, 516–557

auditing, 576–580

countermeasures, 518–520

IoT security, 520

overview, 516–518

network services, 416–417

network technologies, 328–363

network transport protocols, 333–338

network tunneling, 360

networked applications, 362–363

networks, 311–363

described, 311

encryption, 519

infrastructure, 311–363

LANs, 328–338

malware. See malware

managing, 360–361

peer-to-peer networks, 518

security. See network security

switched networks, 519

types of, 313–314

VPNs, 489, 490

WANs, 338–342

wireless, 342–345, 522–526

network/system diagrams, 618

NFC (Near-Field Communications), 345

NIST 800-53, 73

NIST CSF (NIST Cybersecurity Framework), 685–687

NIST Cybersecurity Framework (NIST CSF), 242, 685–687

NIST SP 800-53, 684–685

NIST SP 800-53A, 684–685

nondisclosure agreements (NDAs), 606

nonstatistical sampling, 139

O

object breakdown structure (OBS), 169–170, 175

objectives, 98, 99, 667

objectivity, 135

object-oriented (OO) system development, 223–224

objects, 224, 484

OBS (object breakdown structure), 169–170, 175

observation, 635, 636

Office of Government Commerce (OGC), 695

offshore data flow, 103

OGC (Office of Government Commerce), 695

onboarding, 243–244

online processing systems, 257–258

OO (object-oriented) system development, 223–224

Open Shortest Path First (OSPF), 346

operating systems, 301–302

auditing, 424–425

data communications software, 303

file systems, 303–304

functions of, 301–302

media management systems, 307–308

process management, 301

storage management, 301

operational audits, 128–129, 600

operations. See also IS operations

auditing, 428

IT operations, 173, 281, 428–430

monitoring. See monitoring

problem management, 429–430

roles/responsibilities, 82–83

tasks, 281

operations analyst, 82

operations manager, 82

organization charts, 76–77, 136

organization structure/responsibilities, 76–86

OSI network model, 317–323, 327

OSPF (Open Shortest Path First), 346

output controls, 250–251

outsourcing, 60–67

auditing, 90–91

benefits of, 62

described, 55

governance, 66–67

popularity of, 2

reasons for, 60–61

risks, 62–66

types of jobs outsourced, 61–62

owners, 78

P

PaaS (Platform-as-a-Service), 2, 68–69, 228

PAN (personal area network), 313

parallel test, 397–398

passphrase, 493, 511

password management

auditing, 571–572

controls, 511–512

procedures, 510–512

passwords, 493–496

default, 487, 505

forgotten, 511

guidelines, 493–494, 505, 511, 512

managing. See password management

risks, 494–495

patch management, 486, 502–504, 580

patches, 276, 486

Payment Card Industry Qualified Security Assessor (PCI-QSA) certification, 3

PBC (Provided by Client) lists, 613, 633

PBX (private branch exchange), 547–548

PCAOB (Public Company Accounting Oversight Board), 650–651

PCI Security Standards Council (PCI SSC), 687–689

PCI Self-Assessment Questionnaire (SAQ), 150

PCI SSC (PCI Security Standards Council), 687–689

PCI-DSS, 52–53, 73, 687–689

PCI-QSA (Payment Card Industry Qualified Security Assessor) certification, 3

PDUs (protocol data units), 354

peer-to-peer networks, 518

penetration testing, 503–504, 580

performance optimization, 75

periodic reviews, 85

permissions, 487

personal area network (PAN), 313

personal information, 461–462

personnel management, 53–59. See also employees

access provisioning, 56–57

career paths, 57

contractor management, 59, 79–84

employee development, 57

employee termination. See terminations

employee transfers, 59, 460, 470, 471, 510

hiring, 54–57

insourcing, 60

job titles/descriptions, 57, 79–84, 469

mandatory vacations, 58

outsourcing. See outsourcing

overview, 53–54

performance evaluation, 57

segregation of duties. See segregation of duties

service delivery management, 67–69

sourcing, 60–67

training. See training

phishing, 550

physical access, 564–567

physical access controls, 566–567, 582–583

physical controls, 121, 122

physical environment, 557–558

physical security controls, 564–567, 581–583

overview, 564

PKI (public key infrastructure), 541–542

Platform-as-a-Service (PaaS), 2, 68–69, 228

PMBOK (Project Management Body of Knowledge), 186–187, 696

PMBOK Guide (Guide to the Project Management Body of Knowledge), 693–695

PMI (Project Management Institute), 693

PMP (Project Management Professional), 693

points of entry, 488–489

points of presence, 575–576

Point-to-Point Protocol (PPP), 346

policies, 28–32

access control policy, 31

data classification policy, 30–31

documentation, 28

information security policy, 29, 450–451

mobile device policy, 32

privacy policy, 30

reviewing, 136

risk management, 451

site classification policy, 31

social media policy, 32

system classification policy, 31

technology-related, 32

topics, 28

polymorphism, 224

population standard deviation, 140

portfolio management, 72

PPP (Point-to-Point Protocol), 346

pre-audits, 130, 132, 625–627

precision, 140

preventive controls, 122, 123

primary contact, 593

PRINCE (PRojects IN Controlled Environments), 695–696

PRINCE2, 187–188, 695–696

print servers, 289, 315

privacy, 461–462

privacy laws/regulations, 99

privacy policy, 30

privacy requirements, 201–202, 231

private branch exchange (PBX), 547–548

privilege creep, 59, 510

privileges, 236, 484, 500, 506

probability analysis, 47

problem management, 272–273, 275

problem management operations, 429–430

problems, defined, 272

procedures, 32–33, 118, 136, 270

process architecture, 118

process improvement, 25

process objectives, 667

processes

business, 100

development of, 270

documenting, 32–33, 623–625

management of, 271

overview, 668

processing controls, 248–250

procurement, 232–233, 430–431

production servers, 289

profiles, 242

program charter, 163

program, described, 98

program (or project) evaluation and review techniques (PERT), 179, 180

program management, 162–164

auditing, 251–252

resources, 163, 164

status reports, 164

program manager, 98

programming languages, 209

programs, 162–163

project charters, 136

project (program) evaluation and review techniques (PERT), 179, 180

project life cycle reviews, 601–602

project management, 167–192

agile manifesto, 190

auditing, 251–252

budgets, 164

change management, 184–185

considerations, 672

developing project objectives, 169–170

documentation, 183–184

estimating/sizing projects, 175–178

extreme programming, 191–192

initiating projects, 168

Kanban, 190–191

managing projects, 171

methodologies, 186–192

organizing projects, 167–168

PMBOK, 186–187

PRINCE2, 187–188

project closure, 185–186

project documentation, 183–184

project kickoff meeting, 168

project planning, 173–186

project records, 182–183

resources, 163, 164

roles/responsibilities, 171–173

scheduling tasks, 164, 178–182

Scrum, 188–190

Scrumban, 191

tasks, 164, 174–175, 178–182

work breakdown structure, 170

Project Management Body of Knowledge. See PMBOK

Project Management Institute (PMI), 693

Project Management Professional (PMP), 693

project manager, 84, 172

project portfolio management, 162, 164–165

project sponsor, 172

project tasks. See tasks

project team, 168, 172

projects

considerations, 672

described, 167

examples of, 672

launching, 608–613

life cycle, 601–602

origination of, 595–603

overview, 672

remediating issues via, 664

resource planning for, 631–632

PRojects IN Controlled Environments. See PRINCE

proof of concept, 233

protocol data units (PDUs), 354

protocol standards, 34

prototyping, 222

Provided by Client (PBC) lists, 613, 633

provisioning, 513

proxy servers, 357

Public Company Accounting Oversight Board (PCAOB), 650–651

public key infrastructure (PKI), 541–542

Q

QA (quality assurance), 84, 172, 284–285

QA manager, 84

QAT (quality assurance testing), 214–215

QC manager, 84

QKD (quantum key distribution), 536

QSA (qualified security assessor), 128–129, 688

qualified security assessor (QSA), 128–129, 688

qualitative risk analysis, 48

qualitative risk assessment, 149

quality assurance. See QA

quality assurance testing (QAT), 214–215

quality management, 70–72

quantitative risk analysis, 48–49

quantitative risk assessment, 149

quantum key distribution (QKD), 536

R

race conditions, 486

RACI matrix, 173

RAD (rapid application development), 223

RAID, 413–414

ransomware, 477, 549

rapid application development (RAD), 223

RARP (Reverse Address Resolution Protocol), 346

rates, 605

readiness assessment, 625–627

reciprocal sites, 410–411

recommendations, 650

record counts, 218

records, auditing, 87–89

recovery controls, 123

recovery documentation, 400

recovery plans, 388–392

considerations, 388–390

developing, 418–419

testing, 393–399

recovery point objective (RPO), 377, 405–407

recovery procedures, 386–387

recovery time objective (RTO), 377, 403–407

recruiting, 79

reduced instruction set computer (RISC), 292

reduced sign-on, 499

reengineering, 237–239

referential integrity, 306

regression testing, 277

regulations, 37–38. See also laws/regulations

applicability of, 104

Canadian, 106

considerations, 104, 597

European, 106

information systems and, 102

other, 106

overview, 37–38

privacy, 99

U.S., 105–106

regulators, 389

regulatory requirements, 99, 199–201, 231

release management, 276–278

release process, 276–278

reliability factor, 140

remote access, 315, 489–490, 578

reperformance, 138, 635, 637–638, 639

replication, 415–416

Report of Compliance (ROC), 688

reports/reporting. See also audit reports

application processing, 250–251

to client management, 658–659

risk reporting, 245

to third parties, 659

reputation, 26

request for information (RFI), 206, 232, 596

request for proposals (RFP), 201–206, 232, 596

requirements, 231, 252

requirements definition, 197–206, 276

residual risk, 51, 52, 150, 646–647

resource management, 26, 163, 164, 271

resource planning, 100, 631–632

restoration procedures, 387–388

restoration testing, 502

Reverse Address Resolution Protocol (RARP), 346

reverse engineering, 225–226

RFI (request for information), 206, 232, 596

RFP (request for proposals), 201–206, 232, 596

RISC (reduced instruction set computer), 292

risk

acceptance of, 150

analyzing. See risk analysis

avoidance of, 150

avoiding, 52

changes in, 195

compliance risk, 52–53

control risk, 148

control self-assessment, 150–153

countermeasures, 120–121

detection risk, 148

high-impact events, 50

inherent risk, 148

managing. See risk management

mandatory vacations and, 58

materiality and, 148–149

mitigating, 51, 65–66, 120, 150

monitoring/measuring, 121

outsourcing and, 62–66

overall audit risk, 149

passwords, 494–495

residual, 51, 52, 150, 646–647

sampling risk, 140, 149

software development, 220–221

third parties, 243–245, 259–260, 462–467

transfer of, 150

treatment, 150

user IDs, 494–495

risk acceptance, 52

risk analysis, 44–50

auditing and, 115–121

business threats, 119–120

corporate risk management and, 116–117

countermeasures assessment, 120–121

evaluating business processes, 118–119

identifying business risks, 119–120

ISACA Risk IT Framework, 117

overview, 44, 115–116, 127

threat analysis, 44–46, 119–120

risk appetite, 38

risk assessment

auditing and, 149–150

considerations, 615

internal audits, 597

overview, 74, 149, 150, 612

performing, 610–611

third parties, 259–260

types of, 149

risk evaluation, 40, 117

risk governance, 40, 117

Risk IT framework, 117, 696–697

risk ledger, 136

risk management, 38–53

asset identification, 41–44

components, 39–40

considerations, 25

corporate program, 116–117

laws/regulations, 451

overview, 38–39

process, 40–50

program, 39–40

risk analysis and, 116–117

TPRM, 26, 68, 74, 466–467

risk mitigation, 51, 65–66, 120, 150

risk register, 136

risk reporting, 245

risk response, 40, 117

risk transfer, 51

risk treatments, 39, 50–53, 150

ROC (Report of Compliance), 688

roles, 163

rollback planning, 219

rootkits, 549

routers, 356–357

RPO (recovery point objective), 377, 405–407

RTO (recovery time objective), 377, 403–407

S

SaaS (Software-as-a-Service), 2, 68–69, 193, 227

sample mean, 140

sample standard of deviation, 140

sample testing, 639–640

sampling, 139–141, 146

sampling risk, 140, 149

SAN (storage area network), 414

SAQ (Self-Assessment Questionnaire), 150, 688

Sarbanes-Oxley Act (SOX), 99, 104

Sarbanes-Oxley mandated internal audit, 150

Sarbanes-Oxley requirements, 598–599, 635–636

scalability, 312

scanning attacks, 486

SCARF/EAM (systems control audit review file and embedded audit modules), 145, 259

scope

audit, 100, 127, 595, 615–616

risk management program, 39

screen scraping, 551

script kiddies, 476

scripts, 143, 641–642

Scrum, 188–190

Scrumban, 191

SDLC. See Systems Development Life Cycle

SDN (software-defined networking), 357

search engines, 575

security

awareness, 451–453, 470

employee adherence to, 24, 138, 451–453, 470

human resources, 467–471

information. See information security management

network. See network security controls

physical security controls, 564–567

regulations, 102

roles/responsibilities, 23–25, 83

utility software and, 309

web security, 316

Wi-Fi, 343–344

security administrators, 455

security alerts, 503

security analyst, 83, 455

security architect, 83

security auditor, 83, 455

security conferences, 101

security engineer, 83

security governance, 23–26, 74

security guards, 567, 582

security incident management, 476–481

security incidents, 272, 476, 480–481

security laws/regulations, 102–106

security management, 74–75, 285, 567–568

security manager, 172

security monitoring, 282, 453

security requirements, 199–201, 231

security steering committee, 455

segregation of duties (SOD), 84–86

considerations, 139, 460, 573

controls, 85

issues, 85–86

overview, 84, 484

SDLC and, 601

unauthorized changes and, 235

SEI CMM (Software Engineering Institute Capability Maturity Model), 240–241

self-assessment objectives, 152–153

Self-Assessment Questionnaire (SAQ), 150, 688

senior management, 171

sensitive information, 461–462

considerations, 494

disclosure of, 474–475

encryption, 474–475

protection of, 103

separation of duties. See segregation of duties

server clusters, 297, 302, 416, 417

servers

application, 289, 360

database, 289

file, 289

gateway, 289

jump, 571, 578

print, 289

production, 289

test, 289

web, 289

service continuity management, 280

service delivery management, 67–69

service desk, 83–84, 271

service desk manager, 83

service level agreements (SLAs), 136

service provider audits, 130

service provider contracts, 434

service-level management, 278

services, 483–484, 505

session hijacking, 524

simulations, 396–397

single loss expectancy (SLE), 49

single sign-on (SSO), 499–500, 506

site classification policy, 31

siting/marking, 58–582

situational awareness, 481

SLAs (service level agreements), 136

SLE (single loss expectancy), 49

SLOC (source lines of code), 175–176

smart cards, 496

smartphones, 515, 552

snapshots, 259

social engineers, 476

social media policy, 32

social networking, 518, 575

SOD. See segregation of duties

software. See also applications

acquisition of, 210, 253

audit, 144, 612

data communications software, 303

debugging, 143, 210–211

licensing, 309–310

scanning, 143

updates, 522

utility software, 308–309

versions, 275

virtualization software, 299

software developer, 81, 208–212, 456

software development

approaches/techniques, 221–226

auditing, 253–254

risks, 220–221

roles/responsibilities, 81

software engineer, 81

Software Engineering Institute Capability Maturity Model (SEI CMM), 240–241

software maintenance, 220

software program library, 283–284

software tester, 81

Software-as-a-Service (SaaS), 2, 68–69, 193, 227

software-defined networking (SDN), 357

SONET (Synchronous Optical Networking), 339

SOPs (standard operating procedures), 32–33

source code management, 211–212

source lines of code (SLOC), 175–176

sourcing, 60–67

SOX (Sarbanes-Oxley Act), 99, 104

spam, 550

spam filters, 554

spear phishing, 550

spies/intelligence, 475

split custody, 484

spoofing, 516, 524

spyware, 549

SSAE 18, 130, 604–605, 635–636

SSO (single sign-on), 499–500, 506

staff augmentation, 603

Standard of Good Practice for Information Security, 682–684

standard operating procedures (SOPs), 32–33

standards. See also laws/regulations

considerations, 34, 37, 38

described, 115, 311

development of, 270

vs. guidelines, 115

identifying, 37–38

ISACA. See ISACA entries

overview, 33, 37–38

policy pyramid, 28–29

risk issues, 33–34, 52, 53

types of, 34

statement of work, 133

statements of impact, 374

statistical sampling, 139

steering committee, 24, 27–28

stop-or-go sampling, 139

storage

alternate storage sites, 435, 439

computer, 293–296, 301

media storage, 435

off-site, 438

storage area network (SAN), 414

storage engineer, 82

strategic planning, 26–28

strategies, 667

stratified sampling, 140

subject, 483–484

subnet masks, 349–350

subnets, 349

substantive testing, 131

supplier standards, 34

suppliers, 389

Synchronous Optical Networking (SONET), 339

system development tools, 226–227

system documentation, 137

system hardening, 481, 487, 503, 504–507, 579

system inventories, 618

system/network diagrams, 618

systems administrator, 82

systems analyst, 81, 455

systems architect, 81, 82

systems control audit review file and embedded audit modules (SCARF/EAM), 145, 259

systems developers, 172

Systems Development Life Cycle (SDLC), 192–229

agile development, 222

auditing, 251–255, 601

change management, 273–275

cloud-based infrastructure/applications, 227–229

design, 206–208

development approaches/techniques, 221–226

development phase, 208–212

DevSecOps, 222

feasibility studies, 194, 196–197

implementation, 215–219, 273, 274, 277

overview, 192–193

phases, 193–220

post-implementation, 219–220, 255, 278

prototyping, 222

release management, 276–278

requirements definition, 197–206

software development risks, 220–221

system development tools, 226–227

testing, 212–215, 277

systems development management, 172

systems engineer, 82

systems management, 82

systems operator, 83

T

tailgating, 565

tasks, 164, 174–175, 178–182

T-Carrier, 339–340

TCP (Transmission Control Protocol), 321–322, 353

TCP/IP devices, 356–357

TCP/IP network model, 323–327

TCP/IP protocols, 345–356

technical controls, 121, 122

technical requirements, 198–199, 231

technical support analyst, 84

technology

audits and, 101

changes in, 99

documentation, 618–619

policies, 32

understanding, 610

technology standards, 34

telecom engineer, 82

temperature/humidity controls, 558, 560–561

terminal emulation, 315

terminations

actions after, 58–59

auditing, 573–574

employment agreement, 469

user access and, 460, 508–510

terrorists, 473, 475

test plans, 212–213

contents of, 628–629

control testing activities, 632–647

developing, 616–625

organizing, 627–630

reviewing, 630

test scripts, 143, 641–642

test servers, 289

test transactions, 143

testing, 212–215. See also auditing

auditing, 254

automated testing, 641–642

compliance testing, 131

considerations, 610

control existence, 635–638

control operating effectiveness, 638–642

controls testing cycles, 598–599

cutover test, 218–219, 398

cyclical, 598, 654

data integrity, 257

disaster response plans, 423

discovering exceptions, 642–643, 655

discovering serious incidents, 643–646

document review test, 395

documenting test results, 398–399

estimating effort required, 630

following up, 634, 642–643

functional testing, 214

gathering evidence, 632–634

infrastructure, 233

by inquiry/corroborative inquiry, 637

by inspection, 637, 638–639

lack of evidence, 619

launching testing phase, 634–635

materiality of exceptions, 646–647

observation testing, 636–637

online processing systems, 257–258

parallel test, 397–398

penetration testing, 503–504, 580

vs. pre-audits, 626

quality assurance testing, 214–215

recovery/continuity plans, 393–399, 433, 437

regression testing, 277

by reperformance, 637–638, 639

restoration testing, 502

retesting issues, 663–664

sample testing, 639–640

substantive testing, 131

system testing, 214

unit testing, 213–214, 277

user acceptance testing, 214–215, 277

testing programs, 641

testing standards, 612

theft, 453, 471, 477, 564

thick client, 289

thin client, 290

third parties

assessing, 244

classification, 244, 260

considerations, 610

contracts, 136

managing. See third-party management

need for, 596

onboarding/due diligence, 243–244

remediation, 244–245

reports, 142, 659

risk, 243–245, 259–260, 462–467

service delivery management, 67–69

third-party disaster recovery sites, 411–412

third-party management, 462–467

assessments, 244

classifications, 244

due diligence, 243–244

legal agreements, 260, 465–466

onboarding, 243–244

overview, 243

remediation, 244–245

risk factors, 243

risk reporting, 245

security policies and, 466

types of access, 463

third-party risk management (TPRM), 26, 68, 74, 466–467

threat analysis, 44–47, 119–120, 375–376

threat hunting, 481

threat management, 504

threat modeling, 44–45

threats

access control threats, 485–486

advanced persistent threats, 552

described, 44

environmental, 557–558

Internet communications, 526–532

network-based, 516–518

physical access, 564–566

types of, 45–46

wireless networks, 523–524

time estimates, 605

time synchronization, 316

timebox management, 182

timing, 135

titles, 163

Token Ring, 336, 337

tokens, 495–496, 512–513

tolerable error rate, 141

TPRM (third-party risk management), 26, 68, 74, 466–467

training

audience, 217

for auditors, 101

considerations, 186, 513

cross-training, 58

disaster recovery and, 399

disaster response and, 386

security awareness, 567–568

types of, 56, 600

transaction authorization, 85

transaction flow, 256–259

Transmission Control Protocol (TCP), 321–322, 353

transport layer protocols, 353–354

Trojan horses, 549

trust, 26, 467, 506

tunneling, 360

U

UAT (user acceptance testing), 214–215, 277

UDP (User Datagram Protocol), 322, 353–354

unit testing, 213–214

Universal Serial Bus (USB), 293, 336–337

U.S. regulations, 106

USB (Universal Serial Bus), 293, 336–337

user acceptance testing (UAT), 214–215, 277

user access controls, 570–571

user access management, 508–510

user access provisioning, 508, 572–573

user account provisioning, 494, 510–511

User Datagram Protocol (UDP), 322, 353–354

user IDs, 492–495, 506, 570–571

users

end-user support, 282–283

IT governance, 86–87

passwords. See passwords

roles/responsibilities, 79

training. See training

utility software, 308–309

V

vacations, 58

VAF (value adjustment factor), 177

Val IT (IT Value Delivery) framework, 72, 698–699

value adjustment factor (VAF), 177

variable sampling, 139

vendor manager, 84

video surveillance, 566

virtual desktop, 290

virtual environments, 507

virtual keyboards, 507

Virtual Networks (VLANs), 351–352

virtual private network (VPN), 489, 490

virtual workstation, 315

virtualization, 507, 579

virtualization architectures, 298–300

viruses, 548

visitors, 583

VLANs (Virtual Networks), 351–352

voice over IP (VoIP), 545–547

VoIP (voice over IP), 545–547

VPN (virtual private network), 489, 490

vulnerabilities

access controls, 486–487

described, 47

environmental, 557–558

examples of, 47

identifying/managing, 503–504

malware, 550

physical access, 564–566

vulnerability identification, 47

vulnerability management, 74, 481, 579–580

W

walkthroughs, 137–138, 396, 618

wallet cards, 390, 400

WAN devices, 341–342

WAN (wide area network), 314, 337–338

war chalking, 523

war driving, 523

warm sites, 409, 412

WBS (work breakdown structure), 170, 175

web filtering, 520

web security, 316

web servers, 289, 360

web sites, 316, 517, 551

web-based application development, 225

web-based applications, 363

weighted results, 647

whaling, 551

wide area network. See WAN

Wi-Fi technology, 342–344

WiMAX, 344

wireless networks, 342–345, 522–526

Wireless USB (WUSB), 345

work breakdown structure (WBS), 170, 175

workflow, 85

workpapers, 143–144, 605, 637, 638, 659

workstations, 290

World Wide Web, 359–360

worms, 549

WUSB (Wireless USB), 345

X

XP (extreme programming), 191–192

Z

Zachman framework, 35

zero trust model, 37

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.144.82