INDEX   

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

References to figures are in italics.

4GLs, 256

A

abstraction, 348

access administrator, role and responsibilities, 76

access by unauthorized persons, 488

access bypass, 489

access control lists (ACLs), 473

access control logs, 438

access control management, 436–438

access control policy, 30

access controls, 230, 436, 458–461, 473

access logging, 473–474

auditing, 540–541

access management, 101

auditing, 536–540

access points, 462

access provisioning, 51

account lockout, 483

accumulation of privileges, 54, 483

administrative audits, 166

advanced persistent threats (APTs), 521

Agile development, 251

ALE. See annualized loss expectancy (ALE)

alert management, 545

algorithm, 503

annualized loss expectancy (ALE), 44

annualized rate of occurrence (ARO), 44

anti-malware, 340–341, 455, 490

administrative controls, 520–521

management controls, 521

technical controls, 522–524

See also malware

application code review, 263

application controls, 271–273

auditing, 283–286

calculations, 276

controlling special forms, 277–278

data file controls, 277

editing, 276

error handling, 275

input authorization, 273–274

input controls, 273–275

input validation, 274–275

output controls, 277–278

processing controls, 276

processing errors, 277

reconciliation, 278

report distribution and receipt, 278

retention, 278

application firewalls, 381, 500

application layer protocols, 379–381

application penetration testing, 546

application programming languages, 239

application whitelisting, 491

applications, auditing, 285

architecture review, 542–543

architecture standards, 32–33

ARO. See annualized rate of occurrence (ARO)

ARP, 370

asset identification, 36

collecting and organizing asset data, 38–39

grouping assets, 37

sources of asset data, 37–38

asset inventory and classification, 434

hardware asset inventory, 434–435

information assets, 435–436

asset management system, 38

asset owners, 433

asset value (AV), 44

assets, split custody of high-value assets, 78

asymmetric encryption, 504

ATM, 360

atomicity, 284

attestations, 559–560

attribute sampling, 175–176

audit audience, 557

audit charters, 568, 570–571

audit committee, 432

audit cycle

external attestations, 559–560

how information systems audit cycle is discussed, 556–558

internal audits, 560–564

management’s need for an independent third party, 560

overview of the IS audit cycle, 558

project origination, 559

understanding, 556

audit hooks, 286

audit logging, 231

audit management, 135

the audit charter, 135

audit program, 136

audit risk and materiality, 183

changes in audit activities, 137–138

communication plan, 170

compliance vs. substantive testing, 167–168

computer security and privacy regulations, 140–144

continuing education, 138–139

continuous auditing, 179–180

establishing audit procedures, 169

factors that affect an audit, 136–137

implementing audit recommendations, 187–188

ISACA auditing standards, 144–153

launching a new audit, 572–577

laws and regulations, 139–140

planning an audit, 572–577

post-audit follow-up, 171

reliance on third-party audit reports, 178

reliance on work of other auditors, 177–178

report preparation, 170

resource planning, 138

resource planning for the audit team, 595–596

and staff disagreements, 618–619

System Control Audit Review File and Embedded Audit Modules (SCARF/EAM), 286

technology, 138–139

wrap-up, 170

audit opinions, 611–612, 613

audit recommendations, 613–614

management’s responses to, 621

audit reports

to audit committees, 621–622

to client management, 622

contents, 618

contributing to larger audit reports, 617

delivery of the report, 623–624

discussing the auditor’s wording, 620

distribution of audit reports, 569

electronic reports, 624

management response, 620

reviewing the draft report, 623

signed reports, 623

to third parties, 622

writing the report, 619–620

audit sponsors, 557

auditing

of absent employee’s work, 52

access logs, 540–541

access management, 536–540

additional engagement deliverables, 624

administrative audits, 166

application controls, 283–286

of business continuity planning, 123–125

business controls, 283

checklists, 625

client’s preparedness for an audit, 578

closing procedures, 625

compliance audits, 166

computer operations, 413–414

computer-assisted audit techniques (CAATs), 178, 286

computer-assisted audits and automated work papers, 178–180

continuous auditing, 285–286, 604–605

of contracts, 121–122

data entry, 414

database management systems, 411

delivering audit results, 617

detecting fraud, 182–183

developing a test plan, 581–589

developing audit objectives, 578–579

developing audit opinions, 611–612

developing the audit plan, 577–580

disaster recovery planning, 416–420

of documentation and records, 119–121

employee terminations, 539–540

environmental controls, 546–547

evidence, 171–174

feedback and evaluations, 626

file management, 414

file systems, 410–411

final sign-off with the client, 625–626

financial audits, 165–166

follow-up, 626

forensic audits, 166

generalized audit software (GAS), 179

integrated audits, 166

internal and external, 167, 627

interviewing key personnel, 126

investigative procedures, 541

IS audits, 166

IS hardware, 409–410

of IT governance, 118–127

lights-out operations, 414–415

methodology, 168–171, 575–576

monitoring, 158

monitoring operations, 415

network access controls, 543–544

network access paths, 535–536

network change management, 544–545

network infrastructure, 411–412

network operating controls, 412–413

network security controls, 542–543

objectives, 165, 168

observing personnel, 174–175

operating systems, 410

operational audits, 165, 563–564

of outsourced work, 61, 122–123

password management, 538

performing an audit, 163–165

physical access controls, 548

physical security controls, 547–548

points of presence, 541–542

pre-audit planning, 169

pre-audits, 167, 589–591

problem management operations, 415

procurement, 416

Provided by Client (PBC) lists, 577–578

and quality management, 65

reporting audit results, 180–182

reviewing insurance coverage, 126–127

reviewing service provider contracts, 126

risk analysis, 153–158

risk analysis and corporate risk management program, 153–154

and risk assessment, 184–185

sampling, 175–177

scope, 168, 579–580

security management, 534–535

service provider audits, 166–167

siting and marking, 547–548

statements of work (SOWs), 169

subject, 168

system development life cycle (SDLC), 278–283

and technology, 138–139, 179

third-party audit reports, 178

types of, 165–167, 168

user access controls, 536–538

user access provisioning, 539

vulnerability management, 545–546

See also control self-assessment (CSA)

auditors

and project documentation, 217

and self-assessment, 187

authentication, 230, 463, 465, 543

multifactor authentication (MFA), 468–469

troubles, 485

authorization, 230, 465

automated testing, 605–606

automated work papers, protecting, 178–179

AV. See asset value (AV)

availability management, 306

B

back doors, 460

background verification, 48–50, 444

backup and recovery

backup media rotation, 406–407

backup schemes, 405–406

backup to tape and other media, 405

encryption, 408

media records and destruction, 408–409

media storage, 407–408

and media storage, 474–475

balanced scorecard (BSC), 21–22

standard IT balanced scorecard (IT-BSC), 22

baselining, 285

batch totals, 247

BCP. 2 business continuity planning

benchmarking, 69

outsourcing, 61

a process, 266–267

benefits realization, 196

business case development, 199–200

measuring business benefits, 200–201

portfolio and program management, 196–199

big data architect, role and responsibilities, 74

biometrics, 469–472, 484–485

blade computers, 322

block cipher, 504

Bluetooth, 369

board of directors, 72, 432

security responsibilities, 23

bots, 518–519

BSC. See balanced scorecard (BSC)

budgets, managing project budgets, 198

business alignment, 434

business case, defined, 199

business case development, 199–200

business continuity, 24

and outsourcing, 59

Business Continuity Institute (BCI), 117

Business Continuity Management Institute (BCM Institute), 118

business continuity planning, 45, 68

access management, 101

applications, 101

auditing, 123–125

availability of key personnel, 104

command and control, 98

communications, 99, 105

components of a business continuity plan, 108–109

continuing operations, 103

contract information, 102

data and records, 101

database management systems, 101

developing continuity plans, 93

disaster declaration procedures, 94–96

disasters, 80–86

emergency supplies, 104–105

establishing key recovery targets, 92–93

forming a core team, 95

how disasters affect organizations, 85–86

improving recovery and continuity plans, 114–115

information security and privacy, 101

legal and compliance, 99

maintaining recovery and continuity plans, 117

making plans available to personnel when needed, 115–116

maximum tolerable downtime (MTD), 92

network services, 101

networks, 101

off-site storage, 102

overview, 79–80

personnel safety procedures, 94

policy, 88

process life cycle, 87

and project documentation, 217

recovery procedures, 102–103

restoration, 102

restoration procedures, 103–104

scribe, 99

sources for best practices, 117–118

supplies, 100

systems, 101

testing recovery plans, 109–114

training, 102

training personnel, 115

transportation, 100–101, 108

user hardware, 102

See also disasters

business controls, auditing, 283

business functional requirements, 227–228, 258–259

business impact analysis (BIA), 88

inventorying key processes and systems, 88–89

statements of impact, 90

Business Model for Information Security (BMIS), 637–638

business process life cycle (BPLC), 264–267

business process management (BPM), 266

business process reengineering (BPR), 264–267

business processes, 264

evaluating, 155–156

C

CAATs. See computer-assisted audit techniques (CAATs)

cables

coaxial cable, 357

fiber optic cable, 355–356

serial cable, 357

twisted-pair cable, 353–355

call trees, 107

campus area networks (CANs), 338

Candidate Information Guide, 11

Capability Maturity Model Integration (CMMI), 69

capability maturity models, 267–268

overview, 632–633

capacity management, 69, 305

career paths, 52

CASE. See computer-aided software engineering (CASE)

certificate authority (CA), 509, 511

certificate revocation list (CRL), 512

certificates, 484–485

certification practice statement (CPS), 512

change control board, 300

change management, 61, 63, 261–262, 298–300, 502

auditing, 282

records, 300

channel service unit/digital service unit (CSU/DSU), 366

chargeback, 64

charters, 35

audit charters, 568, 570–571

program charters, 196

checklists, 582, 625

checksums, 247

chief information officer (CIO), 433

role and responsibilities, 73

security responsibilities, 23

chief information risk officer (CIRO), 433

chief information security officer (CISO), 433

role and responsibilities, 74

security responsibilities, 23

chief privacy officer (CPO), 433

role and responsibilities, 74

chief risk officer (CRO), role and responsibilities, 74

chief security officer (CSO)

role and responsibilities, 74

security responsibilities, 23

chief technical officer (CTO), role and responsibilities, 74

CIO. See chief information officer (CIO)

ciphertext, 503

CIS. See continuous and intermittent simulation (CIS)

CISA certification

applying for, 12–13

benefits of, 2–3

direct work experience, 5

after the exam, 12

exam overview, 9–10

exam preparation, 10–12, 16

experience requirements, 4

job practice areas, 5, 10

process, 3–4

retaining, 13–16

revocation of certification, 16

substitution of experience, 5–6

Verification of Work Experience form, 13

CISC, 316

CISO. See chief information security officer (CISO)

classful networks, 375

classless networks, 375–376

cleaning, 532

client organizations, 557

clients, 557–558

feedback and evaluations, 626

helping a client understand and identify controls, 586–587

preparedness for an audit, 578

project planning with the client, 596, 597

understanding client’s needs, 573–574

understanding the client’s procedures, 581–582

client-server applications, 386–387

and data protection laws, 493

securing, 491–493

cloud access security broker (CASB), 543–544

cloud computing, 327

cloud sites, 396

COBIT, 21, 69, 642–643

COBIT 5, 66, 67

controls, 88

controls framework, 162

code generators, 255

Code of Professional Ethics, 7, 144–145

cold sites, 395, 396

collision detection, 358

communications

and business continuity planning, 99, 105

call trees, 107

compensation baselining, 73

complementary patch testing, 546

compliance audits, 166

compliance management, 68

compliance risk, 47

compliance testing, vs. substantive testing, 167–168

component-based development, 253–254

computer crime

blackmail, 450

categories of, 448–449

computers as instruments of a crime, 447–448

computers as targets of a crime, 447

computers used in support of a crime, 448

disclosure of sensitive information, 450

legal, 450

perpetrators of cyber-crime, 450–452

reputation, 450

sabotage, 450

threats of cyber-crime on organizations, 449–450

computer operations, auditing, 413–414

computer-aided software engineering (CASE), 255

computer-assisted audit techniques (CAATs), 178, 286

computers

bus, 317–318

central processing unit (CPU), 316–317

end-user computing, 308

firmware, 320–321

I/O and networking, 321

main storage, 318–319

multicomputer architectures, 322–323

operating systems, 326

secondary storage, 319–320

types of, 313

uses for, 314–315

virtualization architectures, 323–324

configuration management, 263, 301, 502

auditing, 282–283

and change control, 264

controlling and recording configuration changes, 263–264

and project documentation, 217

configuration management database (CMDB), 301

configuration standards, 32

conflicts, identifying and managing, 198

Constructive Cost Model (COCOMO), 209–210

continuing professional education (CPE), 13

CPE credits, 13–14

for IS auditors, 138–139

maintenance fees, 16

renewal period, 15

sample CPE submission, 15

tracking and submitting CPE credits, 14–15

Continuing Professional Education Policy, 14

continuous and intermittent simulation (CIS), 286

continuous auditing, 285–286, 604–605

contracts

outsourcing, 60

terms for addendums, 570

See also engagement letters

control activities, 612–613

control language, correcting, 591

control managers, 557

control objectives, 613

control owners, 557

control risk, 183

control self-assessment (CSA), 185

advantages and disadvantages, 185

auditors and self-assessment, 187

life cycle, 186

objectives, 187

control testing, 556

cyclical controls testing, 561–562

establishing controls testing cycles, 562–563

reviewing existing controls, 563

controls

automated controls, 600

categories of, 160–161

classes of, 159–160

classification, 158, 159

COBIT 5 controls framework, 162

compensating controls, 585–586

control existence failures, 602

and control objectives, 584–589

evaluating control effectiveness, 181–182

general computing controls (GCCs), 163

governance controls, 600

internal control objectives, 161

IS control objectives, 162

IS controls, 163

mapping controls to documentation, 588–589

overview, 633–635

performing control testing, 596–598

testing of control operating effectiveness, 602–606

tests of control existence, 599–602

types of, 158–159

understanding the controls environment, 581–589

controls analyst, role and responsibilities, 76

controls management, 66–67

COSO Internal Control - Integrated Framework, 638–641

CPE. See continuing professional education (CPE)

CPE credits, see

sample CPE submission, 15

tracking and submitting, 14–15

CPO. See chief privacy officer (CPO)

critical path methodology (CPM), 213–215

criticality of analysis, 91–92

CRO. 2 chief risk officer (CRO)

cryptanalysis, 503

CSA. See control self-assessment (CSA)

CSO. See chief security officer (CSO)

CTO. See chief technical officer (CTO)

cutover, 248

cyber-crime. See computer crime

D

data classification policy, 29

data communications software, 327

data destruction policy, 31

data entry

auditing, 414

role and responsibilities, 76

data flow diagrams, 271

data integrity testing, 284

data leakage prevention (DLP), 491, 544

data life cycle, 311–312

data management, 311

roles and responsibilities, 74–75

data manager, role and responsibilities, 74

data migration, 247

data quality management, 312

data validation, 230

database administrator (DBA), role and responsibilities, 75

database analyst, role and responsibilities, 75

database architect, role and responsibilities, 75

database management systems, 101, 328–329

auditing, 411

hierarchical database management systems, 332

object database management systems, 331

organization, 329

relational database management systems (RDBMSs), 329–331

data-oriented system development (DOSD), 252

DBA. See database administrator (DBA)

debugging, 240–241

decryption, 503

default gateway, 374–375

demilitarized zone network (DMZ), 500

Deming, W. Edward, 635

Deming Cycle, 635–636

denial of service (DoS) attacks, 488, 498, 520

design, auditing, 280

detection risk, 183

developers, and project documentation, 217

development, auditing, 281

development practices, 27

DevOps, 250–251

DFDs. See data flow diagrams

dial-up modems, 544

digital certificates, 469, 511

digital envelopes, 510–511

digital rights management, 334–335

digital signature, 503, 510

directories, 328, 339

directory infrastructure, 509

directory services protocols, 381

disaster recovery and business continuity requirements, 231

Disaster Recovery Institute International (DRI International), 118

disaster recovery planning, 24, 68

acquiring additional hardware, 398

auditing, 416–420

data backup and recovery, 404–409

developing recovery plans, 403–404

developing recovery strategies, 393–403

overview, 388–389

recovery and resilience technologies, 399–403

recovery objectives, 389–392

response team’s roles and responsibilities, 389, 390

and risk analysis, 45

site recovery options, 393–397

testing disaster recovery plans, 409

third-party disaster recovery sites, 397

disaster response, auditing, 564–565

disasters, 80

damage assessment, 100

declaration criteria, 95–96

disaster declaration procedures, 94–96

how disasters affect organizations, 85–86

human-made, 83–85

natural, 80–83

physical security, 100

responsibilities, 96–102

salvage, 100

See also business continuity planning

discovery sampling, 176

Discretionary Access Control (DAC), 459

dispute resolution, 60

DNS, 381

documentation

lead sheets, 615–616

managing supporting documentation, 614–615

storing electronic documentation, 615

Domain Name System (DNS), 383

domain registrars, 383

downtime, 92

DSS04, 88

dual power feeds, 528

due diligence, 269

E

eavesdropping, 460, 462, 488, 494, 497

E-Carrier, 364–365

EF. See exposure factor (EF)

effectiveness measurement, 24

electric generators, 528

elliptic curve cryptography, 508

e-mail, 385

e-mail address, 509

e-mail servers, 338

emergency changes, 300

emergency management, 98

call trees, 107

wallet cards, 107–108, 116

emergency response, 98

emergency supplies, 104–105

employee development, 52

employee integrity, 59

employee policy manuals, 50–51

employees

access provisioning, 51

background verification, 48–50

career advancement, 73

career paths, 52

compensation baselining, 73

hiring, 48–51

job descriptions, 51, 72–77, 445

job titles, 72–77

performance evaluation, 52

recruiting, 73

roles and responsibilities, 433

security responsibilities, 23

termination, 53, 481–482, 539–540

training, 52

transfers and reassignments, 53–54, 482–483

vacations, 52

See also personnel management

encapsulation, 253, 348

encryption, 230, 408, 463, 490, 494

applications, 513–514

exchanging initial encryption keys, 506

overview, 502–503

terms and concepts, 503–505

encryption key, 503

end users, 206

end-user computing, 308

end-user management, 206

engagement letters, 568

rates, time estimates, and fees, 569

enterprise architecture (EA), 270, 336

data flow diagrams, 271

Zachman framework, 270–271, 272

environmental controls, 525–526

auditing, 546–547

countermeasures, 527–528

electric power vulnerabilities, 526

physical environment vulnerabilities, 526–527

equipment control and use policy, 31

estimating effort, 594

Ethernet, 357–360

ethics

code, 7, 144–145

and independence, 571–572

evidence, 171–174

gathering testing evidence, 596–598

exception handling, and IT operations, 306–307

exceptions, categorizing or ranking, 611

executive management, 72, 73–74, 432

exposure factor (EF), 44

external audits, 627

F

fail open, fail closed, 458

failover, 402

FDDI, 362

feasibility studies, 199, 224, 226–227, 265, 302

auditing, 279

file and directory sharing protocols, 380

file integrity checking, 263

file management, auditing, 414

file storage, 339

file systems, 327–328

auditing, 410–411

file transfer protocols, 379

files, 328

financial audits, 165–166

write-ups, 581

financial management, 63–64, 304–305

capacity management and, 305

financial system, asset inventory, 37

fire detection, 530

fire prevention, 529

fire suppression, 530–531

firewalls, 381, 499, 543

First in First Out (FIFO), 406

forensic audits, 166

forensic investigations, 456

chain of custody, 456

techniques and considerations, 457

fourth-generation languages, 256

Frame Relay, 365

frameworks

pointers for successful use of, 656–658

summary, 657

fraud, 498

detecting, 182–183

discovery of, 608–609

FTP, 379

FTPS, 379

function point analysis (FPA), 210–211

functional testing, 244

G

GAIT, 645–646

Gantt charts, 212

gate processes, 302–304

GCCs. See general computing controls (GCCs)

general computing controls (GCCs), 163

generalized audit software (GAS), 179–180

geographic clusters, 402, 403

geographic site selection, 396–397

global Internet, 382

applications, 384–385

Global Technology Audit Guides. See GTAG

goals, defined, 631–632

Good-Cheap-Fast triangle, 216

governance

defined, 19, 630–631

outsourcing, 60–61

See also IT governance; security governance

Gramm Leach Bliley Act (GLBA), 47

Grandfather-Father-Son, 406–407

grid computing, 322, 327

GTAG, 644–645

Guide to the Assessment of IT Risk. See GAIT

H

hardware

user hardware, 102

See also IS hardware

hash function, 503

hashing, 509

Health Insurance Portability and Accountability. See HIPAA

helpdesk analyst, role and responsibilities, 77

hierarchical database management systems, 332

HIPAA, security rule, 67

hiring, 48–51

honeynets, 500–501

honeypots, 500–501

hot sites, 394–395, 396

HTTP, 380

HTTPS, 380

human resources security, 443–444

during employment, 445–446

employment agreements, 445

equipment, 446

job descriptions, 445

policy and discipline, 446

screening and background checks, 444

transfers and terminations, 446–447

See also personnel management

I

IaaS, 62–63, 256

ICMP, 372–373

identification, 464–465

identity and access management, 68

IGMP, 373

IMAP, 379

impact analysis, 42–43

implementation, 244–245

auditing, 281–282

auditing post-implementation, 282

cutover, 248

data migration, 247

planning, 245–246

post-implementation review, 249

problems, 567

training, 246–247

improper actions by management, 609–610

improved compliance, 24

incident management, 67–68, 297–298, 502

capacity management and, 305

change management and, 300

configuration management and, 301

incident prevention, 455–456

incident response, 24, 431

auditing, 564–565

phases of, 453–454

testing, 454–455

independence, 571–572

information classification, 435–436

information leakage, 524–525

information security, and privacy, 101

information security management, 427–428

compliance, 432

corrective and preventive actions, 432

executive support, 428

incident response, 431

policies and procedures, 428–429

roles and responsibilities, 432–433

security awareness, 429–430

security monitoring and auditing, 431

information security policy, 28

Information Systems Audit and Control Association. See ISACA

information systems hardware. See IS hardware

information systems operations. See IS operations

Information Technology Assurance Framework (ITAF), 7–9, 144, 648–649

Infrastructure as a Service. See IaaS

infrastructure development and implementation, 257–258

design, 259

evaluation, 260

implementation, 261

maintenance, 261

procurement, 259

requirements, 258–259

review of existing architecture, 258

RFPs, 260

testing, 260

infrastructure penetration testing, 545–546

inherent risk, 183

inheritance, 253

initialization vector (IV), 504

insourcing, 54

instant messaging, 385

instruction manuals, 581

insurance, reviewing coverage, 126–127

integrated audits, 166

integrated development environments (IDEs), 255

integrated test facility (ITF), 286

intellectual property, ownership of, 59

internal audits, 560–564, 627

documentation, 581

Internet communications, 497

security countermeasures, 498–502

threats and vulnerabilities, 497–498

Internet layer protocols, 371–373

interoperability, 259

intrusion detection, 456, 490–491, 500, 543

intrusion prevention systems (IPSs), 491, 500, 543

investigative procedures, auditing, 541

IP, 371

IP addresses, 374, 382–383

special IP addresses, 376–377

IPsec, 373, 514

IPv4, 373–377

IPv6, 377

IrDA, 370

IS auditors, 206

IS audits, 166

IS governance, reviews, 567

IS hardware, 312

architecture, 315–324

auditing, 409–410

computer usage, 313–315

maintenance, 324–325

mobile devices, 315

monitoring, 325

IS operations

IT service management (ITSM), 296–297

management and control of operations, 296

overview, 295–296

ISACA, 1–2

auditing standards, 144–148

chapter training, 139

Code of Professional Ethics, 7, 144–145

IS standards, 7–9

training and conferences, 138

ISACA audit and assurance guidelines

2001, Audit Charter, 148

2002, Organizational Independence, 148

2003, Professional Independence, 148–149

2004, Reasonable Expectation, 149

2005, Due Professional Care, 149

2006, Proficiency, 149

2007, Assertions, 149

2008, Criteria, 150

2201, Engagement Planning, 150

2202, Risk Assessment in Planning, 150

2203, Performance and Supervision, 150

2204, Materiality, 151

2205, Evidence, 151

2206, Using the Work of Other Experts, 151

2207, Irregularity and Illegal Acts, 151

2208, Audit Sampling, 152

2401, Reporting, 152

2402, Follow-up Activities, 152–153

relationship between standards and guidelines, 152

ISACA audit and assurance standards, 145

1001, Audit Charter, 145

1002, Organizational Independence, 145

1003, Professional Independence, 145

1004, Reasonable Expectation, 145–146

1005, Due Professional Care, 146

1006, Proficiency, 146

1007, Assertions, 146

1008, Criteria, 146

1201, Engagement Planning, 146

1202, Risk Assessment in Planning, 146

1203, Performance and Supervision, 146

1204, Materiality, 146–147

1205, Evidence, 147

1206, Using the Work of Other Experts, 147

1207, Irregularity and Illegal Acts, 147

1401, Reporting, 148

1402, Follow-up Activities, 148

relationship between standards and guidelines, 152

ISACA Risk IT Framework, 154–155

ISDN, 365

ISF Standard of Good Practice for Information Security, 646

ISO/IEC 20000, 65–66, 67

ISO/IEC 25010, 268

ISO/IEC 27001, 21, 646–648

requirements, 68

ISO/IEC 27002, 67, 646–648

ISO/IEC 33001, 268

ISO/IEC 38500, 21

ISO/IEC 9000, 65

IT environments, changes to, 583–584

IT governance, 19

auditing, 118–127

balanced scorecard (BSC), 21–22

frameworks, 21

improved, 24

information security governance, 22–24

IT strategy committee, 21

overview, 20

problems with, 119

reviews, 567

security roles and responsibilities, 23

standard IT balanced scorecard (IT-BSC), 22

See also governance

IT operations, 206

and exception handling, 306–307

and project documentation, 217

IT service desk, 297

IT service management (ITSM), 296–297

IT steering committee, 25–26, 205

IT strategic planning

IT steering committee, 25–26

overview, 25

IT strategy committee, 21

IT systems portfolio, 37

IT Value Delivery. See Val IT

ITAF. See Information Technology Assurance Framework (ITAF)

IT-BSC. See standard IT balanced scorecard (IT-BSC)

ITIL, 21, 298, 649–650

J

job descriptions, 51, 72–77, 445

job titles, 72–77

judgmental sampling, 175

jump servers, 544

justification of online presence, 542

K

key encrypting key, 503

key exchange, 504, 505–506

key fingerprint, 509

key length, 503

key management, 512–513

key pair, 507

key performance indicators, 200

keylogging, 520

known errors, 297–298

KPIs. See key performance indicators

L

L2TP, 371

laptop controls, 486

laws, regulations, and standards, 33–34

and audits, 139–140

Canadian, 143

changes in regulation, 225

computer security and privacy regulations, 140–144

effect on audits, 136–137

European, 143–144

Gramm Leach Bliley Act (GLBA), 47

and outsourcing, 60

PCI-DSS, 47

in the U.S., 142–143

Layer 3 switch, 382

Layer 4 switch, 382

Layer 4-7 switch, 382

LDAP, 381

lead sheets, 615–616

See also documentation

least privilege access, 263, 458, 473

lights-out operations, auditing, 414–415

link layer protocols, 370–371

local area networks (LANs), 338, 352

cabling types, 353–357

network transport protocols, 357–362

physical network topology, 352–353

logic bombs, 460

logical access controls, 457–458

access control concepts, 458–459

Long Term Evolution. See LTE

LTE, 369

M

machine authentication controls, 490

maintaining information systems, 261–264

malware, 459–460, 462, 488, 497

anti-malware administrative controls, 520–521

anti-malware management controls, 521

anti-malware technical controls, 522–524

the malware industry, 521

overview, 517–518

past attacks, 522

threats and vulnerabilities, 518–520

See also anti-malware

management, security responsibilities, 23

management procedure documentation, 581

management protocols, 380–381

management representation letter, 612

manager, role and responsibilities, 72, 433

Mandatory Access Control (MAC), 459

mandatory vacations, 52

man-in-the-browser (MITB) attacks, 489

man-in-the-middle (MITM) attacks, 489

masquerading, 498

materiality, 183

of exceptions, 610–611

maximum tolerable downtime (MTD), 92

Media Access Control (MAC), 371

media control, 311

media inventory, 475

media management systems, 332

media manager, role and responsibilities, 76

meetings

closing meetings, 625

daily standup, 222

project kickoff meeting, 202

message digests, 503, 509–510

message security, 507–508

See also encryption

message servers, 388

messaging protocols, 379–380

methodology standards, 32

methods of entry, 462

metropolitan area networks (MANs), 338

middleware, 388

milestone tracking, 208

misuse and abuse requirements, 231

mitigation strategies, 44–45

mobile computing, protecting, 485–487

mobile device controls, 486–487

mobile device policy, 30

mobile sites, 396

modems, 366

monitoring, 307

hardware, 325

security monitoring, 307–308

monitoring operations, auditing, 415

moonlighting policy, 31

MPLS, 363

Multicast, 371–372

multicomputer architectures, 322–323

multifactor authentication (MFA), 468–469

multiplexors, 366

Multiprotocol Label Switching. See MPLS

N

Near-Field Communications. See NFC

netflow, 491

network access controls, auditing, 543–544

network access paths, auditing, 535–536

network administrator, role and responsibilities, 75

network analysis, 497

network architect, role and responsibilities, 75

network architecture, 337–338

network change management, auditing, 544–545

network connectivity

and authentication, 340

and services, 402–403

network engineer, role and responsibilities, 75

network infrastructure, 335

auditing, 411–412

enterprise architecture (EA), 336

network architecture, 337–338

network-based services, 338–341

network management, 341

roles and responsibilities, 75

tools, 385–386

network models, 341

OSI network model, 341–347

TCP/IP network model, 348–352

network operating controls, auditing, 412–413

network routing, 384

network security, 487–488

countermeasures, 490–491

vulnerable network-based services, 489

network security controls, auditing, 542–543

network technologies, 352

network tunneling, 385

network-based threats, 488–489

networked applications, 386

client-server, 386–387

middleware, 388

web-based, 387–388

networks, types of, 337–338

NFC, 369–370

NFS, 380

NIST 800-53, 67

NNTP, 380

nondisclosure agreements, 570

nonrepudiation, 505

NTP, 381

O

object, 458

object breakdown structure, 203, 208

object database management systems, 331

object request broker (ORB) gateways, 388

objectives, defined, 631–632

object-oriented system development, 252–253

OBS. See object breakdown structure

online inquiry, 286

open access, 462

operating systems, auditing, 410

operational audits, 165, 563–564

operational practices, 27

operations, roles and responsibilities, 76

operations analyst, role and responsibilities, 76

operations manager, role and responsibilities, 76

OPM incident, 481

organization chart, 70

organizations structure and responsibilities

overview, 69–71

roles and responsibilities, 71

OSI network model, 341–342

application layer, 347

data link layer, 343–344

network layer, 344–345

physical layer, 342–343

presentation layer, 346–347

session layer, 346

and TCP/IP network model, 351–352

transport layer, 345–346

OSPF, 371

outsourcing

auditing, 61, 122–123

benchmarking, 61

benefits of, 56

governance, 60–61

mitigating outsourcing risk, 59–60

overview, 55–56

risks associated with, 56–59

owner, role and responsibilities, 72

P

PaaS, 62–63, 256

parallel testing, 285

password management, 483–484

auditing, 538

passwords, 466–467, 468

changing default passwords, 478

using nonpredictable passwords, 478

patch management, 475–476, 546

payment, outsourcing, 60

Payment Card Industry Data Security Standard. See PCI-DSS

PBX. See private branch exchange (PBX)

PCI-DSS, 47, 67, 142

performance evaluation, 52

performance optimization, 69

periodic reviews, 78

personal area networks (PANs), 337–338

personal information, 438–439

personnel management

access provisioning, 51

career paths, 52

employee development, 52

employment agreements, 445

hiring, 48–51

human resources security, 443–447

insourcing, 54

job descriptions, 51, 445

mandatory vacations, 52

outsourcing, 55–61

overview, 48

performance evaluation, 52

preparing staff for an audit, 595–596

sourcing, 54

staff augmentation, 568

termination, 53

training, 52, 115

transfers and reassignments, 53–54

See also employees

personnel safety procedures, 94

phishing, 519

physical access

controls and countermeasures, 533–534

threats and vulnerabilities, 532–533

physical access controls, auditing, 548

physical security controls, auditing, 547–548

plaintext, 503

Plan-Do-Study-Act, 635–636

Platform as a Service. See PaaS

PMBOK. See Project Management Body of Knowledge (PMBOK)

points of entry, 462–463

points of presence, auditing, 541–542

policies, 26–27

access control policy, 30

business continuity planning policy, 88

data classification policy, 29

data destruction policy, 31

development practices, 27

equipment control and use policy, 31

information security policy, 28

IT processes, documents, and records, 27

mobile device policy, 30

moonlighting policy, 31

operational practices, 27

privacy policy, 28–29

roles and responsibilities, 27

security policy, 59

site classification policy, 30

social media policy, 30–31

system classification policy, 29

polymorphism, 253

POP, 379

portfolio management, 66

power distribution units (PDUs), 528

PPP, 371

pre-audits, 167, 589–591

primary contact, 557

PRINCE2. See Projects IN Controlled Environments (PRINCE2)

print servers, 338–339

privacy, 438–439

computer security and privacy regulations, 140–144

and information security, 101

privacy policy, 28–29

privacy requirements, 231–232, 259

private branch exchange (PBX), 516–517

private key cryptosystems, 505–506

privilege creep, 54, 483

probability analysis, 42

problem management, 298

auditing, 415

capacity management and, 305

change management and, 300

configuration management and, 301

procedures. See processes and procedures

process, defined, 264

process groups, 651

process improvement, 24

processes

defined, 632

example process, 632

processes and procedures, 26–27, 31–32

documenting, 587–588

processing facilities, evaluating, 419

procurement, auditing, 416

program (or project) evaluation and review techniques (PERT), 213, 214

program management

program charter, 196

running a program, 197–198

starting a program, 196–197

program manager, 196

project change management, 217–218

project management, 201

auditing, 279

developing project objectives, 202–204

documentation, 216–217

initiating projects, 202

managing projects, 204–205

methodologies, 219–223

object breakdown structure, 203

organizing projects, 201–202

project closure, 218–219

project kickoff meeting, 202

Project Management Body of Knowledge (PMBOK), 219–220

project records, 215–216

Projects IN Controlled Environments (PRINCE2), 220–221

roles and responsibilities, 205–206

scheduling project tasks, 211–215

Scrum, 221–223

work breakdown structure, 203–204

Project Management Body of Knowledge (PMBOK), 219–220, 650–652

project management knowledge areas, 651

project manager, 205

role and responsibilities, 77

project planning, 206–208

project portfolio management, 198–199

project sponsor, 206

project team members, 205

projects

life cycle reviews, 565–567

management projects to remediate issues, 627

overview, 636

Projects IN Controlled Environments (PRINCE2), 220–221, 652–653

proof of concept, 261

protocol data units (PDUs), 378

protocol standards, 32

prototyping, 251

Provided by Client (PBC) lists, 577–578

provisioning, 485

proxy servers, 381

public key cryptography, 504

public key cryptosystems, 506–509

public key infrastructure (PKI), 511–512

public keys, verifying, 509

Q

QA manager, role and responsibilities, 77

QC manager, role and responsibilities, 77

qualitative risk analysis, 43

quality assurance, 206, 310

roles and responsibilities, 77

testing, 244

quality management, 64–65

quantitative risk analysis, 43–44

R

race conditions, 460

RACI matrix, 207

RAID, 399–400

rapid application development (RAD), 252

RARP, 370

rcp, 379

RDP, 380

readiness assessments. See pre-audits

reciprocal sites, 396

record counts, 247

recovery point objective (RPO), 93, 391

pricing capabilities, 392

publishing figures, 391

recovery procedures, 102–103

testing recovery plans, 109–114

recovery time objective (RTO), 93, 389–391

pricing capabilities, 392

publishing figures, 391

recruiting, 73

reduced sign-on, 472

referential integrity, 284, 330

registration authority (RA), 511

regulations

See also laws, regulations, and standards

relational database management systems (RDBMSs), 329–331

release management, 301–304

reliability, classification of, 531

remote access, 339, 463–464, 544

replication, 400–401

reports, status reports, 198

request for proposals. See RFP process

requirements, auditing, 279–280

residual risk, 46, 47

assessing, 610–611

resource management, 24, 198

restoration procedures, 103–104

restoration testing, 475

reverse engineering, 254

RFP process, 232–236, 260

RISC, 316

risk

associated with outsourcing, 56–59

associated with third-party access, 441

audit risk and materiality, 183

compliance risk, 47

defined, 39

reducing risk with mandatory vacations, 52

residual risk, 46, 47, 610–611

and third parties, 439–440

third-party risk, 68

with user IDs and passwords, 468

risk acceptance, 47, 185

risk analysis, 39

in the context of an audit, 153–158

countermeasures assessment, 157–158

and disaster recovery planning, 45

evaluating business processes, 155–156

high-impact events, 45

identifying business risks, 156–157

impact analysis, 42–43

ISACA Risk IT Framework, 154–155

mitigation strategies, 44–45

possible threats, 40–41

probability analysis, 42

qualitative risk analysis, 43

quantitative risk analysis, 43–44

threat analysis, 40

vulnerability identification, 42

risk appetite, 34

risk assessment, 67

auditing and, 184–185

performing, 574–575

risk avoidance, 46, 184

risk evaluation, 36

risk governance, 36

Risk IT, 6535

risk management, 24

asset identification, 36–39

overview, 34

process, 36

program, 34–35

risk mitigation, 46, 157

mitigating outsourcing risk, 59–60

risk reduction, 184

risk response, 36

risk transfer, 46, 184

risk treatments, 34, 45–46, 184–185

rlogin, 380

roles and responsibilities, 23, 27, 60, 71–72

rootkits, 518

routers, 366, 381

RPC, 380

RPC gateways, 388

S

SaaS, 62–63, 256

sample testing, 598, 603–604

sampling, 175–177

sampling risk, 183

Sarbanes-Oxley Act, 142

scalability, 506

scanning attacks, 460

schedules

monitoring project schedules, 197–198

and outsourcing, 60

scheduling project tasks, 211–215

SCP, 379

Scrum, 221–223

Secure Electronic Transaction (SET), 514

secure key exchange, 506

Secure Sockets Layer/Transport Layer Security (SSL/TLS), 513–514

security

awareness, 429–430

information security governance, 22–24

information security policy, 28

monitoring and auditing, 431

relational databases, 331

roles and responsibilities, 23

security and HR procedure testing, 598

and utilities, 333–334

Wi-Fi, 367–368

security administrators, 433

security analyst, 433

role and responsibilities, 76

security and regulatory requirements, 228–229, 259

security architect, role and responsibilities, 76

security auditor, role and responsibilities, 76–77

security auditors, 433

security awareness training, 502

security engineer, role and responsibilities, 76

security governance, 67

activities and results, 24–25

reasons for, 24

See also security governance

security incident management, 452–453

security management, 67–68, 310

auditing, 534–535

security manager, 206

security monitoring, 307–308

security operational requirements, 231

security operations, roles and responsibilities, 76–77

security policy, 59

addressing third-party security in, 443

security steering committee, 433

segregation of duties, 175, 263, 458–459

controls, 78–79

overview, 77–78

senior management, 205

server clusters, 322–323, 326–327, 402

service continuity management, 305–306

See also business continuity planning; disaster recovery planning

service desk, 297

roles and responsibilities, 77

service desk manager, role and responsibilities, 77

service level agreements, 59, 61

service providers

audits, 166–167

reviewing contracts, 126

service-level management, 304

capacity management and, 305

session hijacking, 495

session protocols, 380

SFTP, 379

S-HTTP, 514

single loss expectancy (SLE), 44

single sign-on, 473

site classification policy, 30

siting and marking, auditing, 547–548

situational awareness, 455

SLAs. See service level agreements

SLE. See single loss expectancy (SLE)

SLOC. See source lines of code

SMART, 202

smart cards, 469

smartphone controls, 486

S/MIME, 514

SMS tokens, 469

SMTP, 379

SMTPS, 379

snapshots, 286

sniffers, 386

SNMP, 380

social media policy, 30–31

SOD. See segregation of duties

soft tokens, 469

software

audit software, 179

data communications, 327

licensing, 334

maintenance, 249

utility software, 332–333

software acquisition, auditing, 280

Software as a Service. See SaaS

software developers, 433

software development

alternative approaches and techniques, 250

risks, 249–250

roles and responsibilities, 74

software engineer/developer, role and responsibilities, 74

Software Engineering Institute Capability Maturity Model (SEI CMM), 267–268

software mapping, 285

software program library management, 309–310

software projects, estimating and sizing, 208–211

software tester, role and responsibilities, 74

software-defined networking (SDN), 382

SONET, 363

source code management, 241

source lines of code, 208

sourcing, 54

spam, 519

spear phishing, 520

split custody, 459

spoofing, 488, 495

sprint, 222

spyware, 518

SSH, 380, 514

standard IT balanced scorecard (IT-BSC), 22

See also balanced scorecard (BSC)

standards, 26–27, 32–33

See also laws, regulations, and standards

statement of impact, 43

statements of work (SOWs), 60–61

for audits, 169

statistical sampling, 175

status reports, 198

steering committee, security responsibilities, 23

stop-or-go sampling, 176

storage

backup and media storage, 474–475

evaluating off-site storage, 419

off-site storage, 102

visiting media storage and alternate processing sites, 127

storage engineer, role and responsibilities, 75

strategic planning. See IT strategic planning

strategies, defined, 631

stratified sampling, 176

stream cipher, 504

subject, 458

subnet masks, 374

substantive testing, vs. compliance testing, 167–168

supplier standards, 32

support, and project documentation, 216

switched networks, 490

symmetric encryption, 504

Synchronous Optical Networking. See SONET

system classification policy, 29

System Control Audit Review File and Embedded Audit Modules (SCARF/EAM), 286

system development life cycle (SDLC), 223

acquiring cloud-based infrastructure and applications, 256–257

Agile development, 251

application programming languages, 239

auditing, 278–283

business functional requirements, 227–228

component-based development, 253–254

computer-aided software engineering (CASE), 255

data-oriented system development, 252

debugging, 240–241

design, 236–238

development, 238–241

development in a software acquisition setting, 239–240

DevOps, 250–251

disaster recovery and business continuity requirements, 231

feasibility studies, 224, 226–227

fourth-generation languages, 256

implementation, 244–248

integrated development environments (IDEs), 255

object-oriented system development, 252–253

organizing and reviewing requirements, 232

phases, 223–224

post-implementation, 248–249

privacy requirements, 231–232

prototyping, 251

rapid application development (RAD), 252

requirements definition, 227–236

reverse engineering, 254

RFP process, 232–236

security and regulatory requirements, 229–231

software and business capabilities imagined, 224–226

software development risks, 249–250

software maintenance, 249

source code management, 241

system development tools, 255

technical requirements and standards, 228–229

testing, 241–244

web-based application development, 254

system development tools, 255

system hardening, 455–456, 477

changing default passwords, 478

changing systems from multifunction to single-function, 477

limiting functionality or privilege of necessary services, 478

reducing or eliminating interserver trust, 479

reducing user privileges, 479

removal of unnecessary services, 478

removing nonessential user IDs, 478–479

using nonpredictable passwords, 478

system testing, 243–244

systems administrator, role and responsibilities, 75

systems analyst, 433

role and responsibilities, 74

systems architect, role and responsibilities, 74, 75

systems developers, 206

systems development management, 206

systems engineer, role and responsibilities, 75

systems management, roles and responsibilities, 75

systems operator, role and responsibilities, 76

T

targeted attacks, 497

tasks

dependencies, 208

estimation, 207

identification, 207

milestone tracking, 208

resources, 207

scheduling project tasks, 211–215

task tracking, 208

T-Carrier, 363–365

TCP, 377–378

TCP/IP network devices, 381–382

TCP/IP network model, 348

application layer, 351

Internet layer, 349

link layer, 349

and OSI network model, 351–352

transport layer, 349–351

TCP/IP protocols and devices, 370–381

technical requirements and standards, 228–229, 259

technical support analyst, role and responsibilities, 77

technology

and audits, 138–139, 179

familiarity with, 461

understanding the technology environment, 582–583

technology standards, 32

telecom engineer, role and responsibilities, 75

telnet, 380

temperature and humidity controls, 529

terminal emulation, 339–340

termination, 53

test batches, 285

testing, 241–242

auditing, 281

automated, 605–606

compliance vs. substantive testing, 167–168

of control operating effectiveness, 602–606

data integrity testing, 284

debugging, 240–241

developing a test plan, 581–589

disaster recovery plans, 409

discovering incidents requiring immediate attention, 607–610

discovering testing exceptions, 606–607

functional testing, 244

incident response, 454–455

infrastructure development and implementation, 260

by inquiry and corroborative inquiry, 601

by inspection, 601, 602–603

launching the testing phase, 599

online processing systems, 284–285

organizing a test plan, 591–594

parallel testing, 285

programs, 605

quality assurance testing (QAT), 244

restoration testing, 475

retesting issues in succeeding periods, 626–627

sample testing, 598, 603–604

security and HR procedure testing, 598

system testing, 243–244

test plans, 242

test scripts, 606

tests of control existence, 599–602

through reperformance, 601–602, 603

unit testing, 240, 243

user acceptance testing (UAT), 244

testing recovery plans, 109–110

cutover test, 114

document review, 111

documenting test results, 114

parallel testing, 113–114

reviewing prior test results and action plans, 125

simulation, 112–113

test preparation, 110–111

walkthroughs, 111–112

third-party management, 268, 439

access countermeasures, 441–442

addressing third-party security in legal agreements, 442–443

addressing third-party security in security policy, 443

assessment, 270

auditing, 286–287

classification, 269–270

onboarding and due diligence, 269

remediation, 270

risk factors, 268–269

risks associated with third-party access, 441

third parties and risk, 439–440

types of third-party access, 440

third-party risk, 68

third-party service delivery management, 61–62

threat analysis, 40

threat hunting, 455, 477

threat management, 477, 502

threat modeling, 477

threats

access control threats, 459–460

advanced persistent threats (APTs), 521

of cyber-crime on organizations, 449–450

defined, 40

network-based, 488–489

TIA-942 Telecommunications Infrastructure Standards for Data Centers, 531

time synchronization, 340

timebox management, 215

Token Ring, 360–361

tokens, 469, 484–485

Towers of Hanoi, 407

training, 52, 102, 246–247, 485

cross-training, 52

for disaster response and business continuity, 115

transaction authorization, 78

transaction flow, 283

transaction processing (TP) monitors, 388

transaction tracing, 285

transport layer protocols, 377–379

Trojan horses, 518

tunneling, 385

U

UDP, 378–379

uninterruptible power supplies (UPSs), 527

unit testing, 240, 243

Universal Serial Bus (USB), 361–362

U.S. Cybersecurity Framework, 68

U.S. Department of Defense (DoD), employee requirements, 2–3

U.S. Federal Emergency Management Agency (FEMA), 118

U.S. National Fire Protection Agency (NFPA), 117–118

U.S. National Institute of Standards and Technology (NIST), 117

U.S. Office of Personnel Management (OPM), 481

user, role and responsibilities, 72

user acceptance testing (UAT), 244

user access controls, auditing, 536–538

user access management, 480

employee termination, 481–482

employee transfers, 482–483

user access provisioning, 480–481

user access provisioning, auditing, 539

user account provisioning, 467–468

user authentication controls, 490

user IDs, 465–466, 468

removing nonessential user IDs, 478–479

users, and project documentation, 216

utilities, and security, 333–334

utility software, 332–333

V

vacations, 52

Val IT, 66, 655–656

value adjustment factor (VAF), 210

variable sampling, 176

vendor manager, role and responsibilities, 77

Verification of Work Experience form, 13

virtual networks (VLANs), 376

virtual workstations, 340

virtualization architectures, 323–324

virtualization environments, securing, 479–480

viruses, 518

Voice over IP (VoIP), 515–516

vulnerabilities

access control, 460–461

defined, 42

vulnerability and threat monitoring, 455

vulnerability identification, 42

vulnerability management, 68, 455, 476–477

auditing, 545–546

W

walkthroughs, 582

WAN switch, 366

war chalking, 494

war driving, 494

warm sites, 395, 396

warranty, 60

WBS. See work breakdown structure

web filtering, 543

web security, 340

web-based application development, 254

web-based applications, 387–388

website filtering, 491

wide area networks (WANs), 338, 362

devices, 366

protocols, 363–365

wide area transmission modes, 362–363

Wi-Fi, 367–368

access points, 544

WiMAX, 368–369

wireless networks, 366–367

Bluetooth, 369

countermeasures, 495–496

IrDA, 370

LTE, 369

NFC, 369–370

securing, 493–496

threats and vulnerabilities, 493–495

Wi-Fi, 367–368

WiMAX, 368–369

Wireless USB (WUSB), 369

Wireless USB (WUSB), 369

work breakdown structure, 203–204, 208

work orders, 60–61

workflow, 78

workpapers, ownership of, 570

World Wide Web, 384

worms, 518

X

X.25, 365

X.500, 381

Z

Zachman framework, 270–271, 272

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.108.68