O'Reilly logo

CISA® Certified Information Systems Auditor®: Study Guide, Third Edition by David Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

ABAC. See attribute-based access control

Absolute Software

acceptable use policy (AUP)

access. See also specific access types

control

rights

access control list (ACL)

access points (APs)

accountability

accounting

configuration

job

sourcing

accounts payable (AP)

accreditation

ACID. See atomicity, consistency, isolation, and durability

ACL. See access control list

activation criteria

active attack

active content

Active Server Pages (ASP)

ActiveX

activities

ad hoc network

adaptive response

address binding

Address Resolution Protocol (ARP)

address spoofing. See spoofing

addressed, defined

Adelphia Communications Corporation

administration

audit programs

on IT steering committee

administrative audits

administrative controls

gas chemical systems ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required