O'Reilly logo

CISA® Certified Information Systems Auditor®: Study Guide, Third Edition by David Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Protecting Information Assets

The objective of this chapter is to acquaint the reader with the following concepts:

  • Threats to security, perpetrators, and attack methods
  • Perimeter security designs, firewalls, and intrusion detection
  • Logical access controls for identification, authentication, and restriction of users
  • Changes in wireless security, including the robust security network
  • Encryption systems using symmetric and asymmetric public keys
  • How encryption is used to provide confidentiality or authentication
  • Understanding the differences of digital certificates, digital signatures, and digital rights management
  • Controls and risks with the use of portable devices
  • Security testing, monitoring, and assessment tools

In this chapter, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required