O'Reilly logo

CISA Exam Cram™ 2 by Keith Mortier, Allen Keele

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Protection of Information Assets

Key concepts you will need to understand:

  • ✓ The processes of design, implementation, and monitoring of security (gap analysis baseline, tool selection)

  • ✓ Encryption techniques (DES, RSA)

  • ✓ Public key infrastructure (PKI) components (certification authorities, registration authorities)

  • ✓ Digital signature techniques

  • ✓ Physical security practices

  • ✓ Techniques to identify, authenticate, and restrict users to authorized functions and data (dynamic passwords, challenge/response, menus, profiles)

  • ✓ Security software (single sign-on, intrusion-detection systems [IDS], automated permission, network address translation)

  • ✓ Security testing and assessment tools (penetration testing, vulnerability scanning)

  • ✓ Network and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required