O'Reilly logo

The CISA® Prep Guide: Mastering the Certified Information Systems Auditor Exam by John Kramer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

2.10. Resources

  • Information Security Policies Made Easy Version 9, Charles Cresson Wood (PentaSafe, 2002).

  • Bits Framework: Managing Technology Risk for Information Technology (IT) Service Provider Relationships, October 2001. (www.bai.org/pdf/BITS-update-120901.pdf, for example.)

  • FFIEC guidance, "Risk Management of Outsourced Technology Services," issued November 28, 2000.

  • AICPA Issues SOP 98-1 for "Internal-Use" Computer Software Accounting, March 5, 1998 (www.aicpa.org/news/p030598a.htm).

  • Information regarding the Gramm-Leach-Bliley Act of 1999 (www.senate.gov/~banking/conf/).

  • U.S. Department of Health and Human Services — Administrative Simplification (http://aspe.hhs.gov/admnsimp/).

  • RSA: Cybersecurity Czar Urges Cooperation, Spending — InfoWorld Daily News, February 19, 2002, article 1197.

  • Information Systems Security Officer Guide, Dr. Gerald L. Kovacich, Butterworth-Heinemann, 1998.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required