The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation
Author: Richard E. Cascarino
Publisher: CRC Press
Total Pages: 273
Release: 2020-10-05
Genre: Computers
ISBN: 0429644213

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.

Process Management

Process Management
Author: Jörg Becker
Publisher: Springer Science & Business Media
Total Pages: 347
Release: 2013-06-05
Genre: Business & Economics
ISBN: 354024798X

Process Management is a compendium for modern design of process-oriented companies. A hands-on approach introducing, realizing and continually administering process management is presented with a thoroughly critical reflection of the necessary activities regarding the state of the art of organization theory and information management. This is done by following individual stages of a process model which has already successfully proved in practice. The progress of the project is described by a continuous case study which is the process management project of a modern service company. The included recommendations are summarized in a series of checklists for each stage of the project.

Attribute-Based Access Control

Attribute-Based Access Control
Author: Vincent C. Hu
Publisher: Artech House
Total Pages: 285
Release: 2017-10-31
Genre: Computers
ISBN: 1630814962

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.

Project Risk Management

Project Risk Management
Author: C. B. Chapman
Publisher:
Total Pages: 389
Release: 2003
Genre: Project management
ISBN: 9781601199263

Based on sound conceptual foundations yet developed to meet practical concerns, Project Risk Management has become recognized as a standard work on its subject. It sets out the key issues and concepts involved in effective risk and uncertainty management in a clear and accessible way, providing a comprehensive discussion of risk management processes set firmly in the context of the project management task as a whole and focused on improving performance.

Privileged Attack Vectors

Privileged Attack Vectors
Author: Morey J. Haber
Publisher: Apress
Total Pages: 403
Release: 2020-06-13
Genre: Computers
ISBN: 1484259149

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems

Advances in Information and Communication

Advances in Information and Communication
Author: Kohei Arai
Publisher: Springer Nature
Total Pages: 1125
Release: 2021-04-12
Genre: Technology & Engineering
ISBN: 3030731006

This book aims to provide an international forum for scholarly researchers, practitioners and academic communities to explore the role of information and communication technologies and its applications in technical and scholarly development. The conference attracted a total of 464 submissions, of which 152 submissions (including 4 poster papers) have been selected after a double-blind review process. Academic pioneering researchers, scientists, industrial engineers and students will find this series useful to gain insight into the current research and next-generation information science and communication technologies. This book discusses the aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of things, from classical to intelligent scope. The authors hope that readers find the volume interesting and valuable; it gathers chapters addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of the future research.

Process Management

Process Management
Author: Nadja Damij
Publisher: Springer Science & Business Media
Total Pages: 223
Release: 2013-10-19
Genre: Business & Economics
ISBN: 3642366392

Process management affects the functioning of every organization and consequently affects each of us. This book focuses on the multi-disciplinary nature of process management by explaining its theoretical foundations in relation to other areas such as process analysis, knowledge management, and simulation. A crucial linkage between theory and concrete methodology of Tabular Application Development (TAD) is presented as a practical approach consisting of five phases that deal with process identification and modeling, process improvement, development of a process management system and finally - monitoring and maintenance. This book is important for researchers and students of business and management information systems, especially those dealing with courses on process management or related fields. Managers and professionals in process management will also find this book to be useful for their everyday business.

Data Governance

Data Governance
Author: John Ladley
Publisher: Academic Press
Total Pages: 352
Release: 2019-11-08
Genre: Technology & Engineering
ISBN: 0128158328

Managing data continues to grow as a necessity for modern organizations. There are seemingly infinite opportunities for organic growth, reduction of costs, and creation of new products and services. It has become apparent that none of these opportunities can happen smoothly without data governance. The cost of exponential data growth and privacy / security concerns are becoming burdensome. Organizations will encounter unexpected consequences in new sources of risk. The solution to these challenges is also data governance; ensuring balance between risk and opportunity. Data Governance, Second Edition, is for any executive, manager or data professional who needs to understand or implement a data governance program. It is required to ensure consistent, accurate and reliable data across their organization. This book offers an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. This valuable resource provides comprehensive guidance to beginning professionals, managers or analysts looking to improve their processes, and advanced students in Data Management and related courses. With the provided framework and case studies all professionals in the data governance field will gain key insights into launching successful and money-saving data governance program. - Incorporates industry changes, lessons learned and new approaches - Explores various ways in which data analysts and managers can ensure consistent, accurate and reliable data across their organizations - Includes new case studies which detail real-world situations - Explores all of the capabilities an organization must adopt to become data driven - Provides guidance on various approaches to data governance, to determine whether an organization should be low profile, central controlled, agile, or traditional - Provides guidance on using technology and separating vendor hype from sincere delivery of necessary capabilities - Offers readers insights into how their organizations can improve the value of their data, through data quality, data strategy and data literacy - Provides up to 75% brand-new content compared to the first edition

Business Process Management

Business Process Management
Author: John Jeston
Publisher: Routledge
Total Pages: 689
Release: 2014-01-21
Genre: Business & Economics
ISBN: 113617298X

This textbook provides organisational leadership with an understanding of business process management and its benefits to an organisation. It provides a practical framework, complete with a set of tools and techniques, to successfully implement business process management projects.

Process Mapping and Management

Process Mapping and Management
Author: Sue Conger
Publisher: Business Expert Press
Total Pages: 488
Release: 2011-06-13
Genre: Business & Economics
ISBN: 160649130X

This book provides a blueprint of how to develop a discipline for process management that applies to any type of orientation. As the economy moves toward a services orientation, companies are struggling with how to improve their offerings. Process management is a key component of the services that companies provide, and author Sue Conger has written a helpful tool to learn more of this key component now helping companies around the world. This book has three main parts: mapping, improvement, and error-proofing and metrics. In the first part—mapping—the reader will learn how to map a process so that the map is immediately understandable for identifying the roles, work steps, and automation support used in process delivery. The second part improvement—provides a series of techniques for defining, prioritizing, and analyzing problems from several perspectives. The first perspective is called “leaning,” and its purpose is to remove waste from an existing process. The second perspective is “cleaning,” during which the remaining steps following leaning are analyzed for possible improvement. The third perspective is “greening,” which explores opportunities and trade-offs for outsourcing, coproduction, and environmental improvements related to the process. The final part of the book—error-proofing and metrics—presents several techniques for ensuring risk mitigation for the new process and for measuring changes that define their impacts and discusses a method for proposing changes to executives in a “case for change.” And throughout this book, Conger provides a blueprint of how to develop a discipline for process management that applies to any type of orientation.