Public Key Cryptography and Other Emerging Technologies

In this chapter, we will concentrate on public key cryptography, and other important aspects of information asset security and control. An IS auditor is required to have a thorough understanding of elements of public key infrastructure. They should also have the ability to evaluate the functioning of public key cryptography and other technologies.

The following topics will be covered in the chapter:

  • Public key cryptography
  • Elements of public key infrastructure
  • Cloud computing
  • Virtualization
  • Mobile computing
  • Internet of Things (IoT)

At the end of the chapter, CISA aspirants will be able to understand and evaluate various aspects of public key infrastructure and other technology.

Public ...

Get CISA – Certified Information Systems Auditor Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.