passcisa Profile

Join Date:
2008-09-21

Blogs Owned

Blog is mainly for CISA Preparation.This is highly suited for IS Auditors & Information Security.. Professionals as it provides foundation of Information Security and IS Audit.

Visit Follow

Other Tags: Information Security, IS Audit, CISA, cyber security, cyber crime

Latest Blog Posts

  • Links for 2016-08-23 [del.icio.us]
    on Aug 24, 2016
    Sponsored: 64% off Code Black Drone with HD Camera Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!
  • Links for 2016-04-29 [del.icio.us]
    on Apr 30, 2016
    Sponsored: 64% off Code Black Drone with HD Camera Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!
  • Business Continuity Planning (BCP)– Essential Steps
    on Jan 5, 2009 in BCP and DRP
    Disaster can happen anytime to any strong setup. The best way to provide stability is by establishing mechanisms to provide continuity to all critical Operations. This can be achieved by a proper... [[ This is a content summary only. Visit my websit...
  • Business Continuity Planning (BCP)– Essential Steps
    on Jan 5, 2009 in BCP and DRP
    Disaster can happen anytime to any strong setup. The best way to provide stability is by establishing mechanisms to provide continuity to all critical Operations. This can be achieved by a proper... [[ This is a content summary only. Visit my websit...
  • Passing CISA is easy - final tips to pass CISAAll your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
  • Passing CISA is easy - final tips to pass CISAAll your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
  • CISA Quick Tips 08-1112
    on Dec 11, 2008 in CISA - Quick Tips
    1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
  • CISA Quick Tips 08-1112
    on Dec 11, 2008 in CISA - Quick Tips
    1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
  • CISA Quick Tips 08-1012
    on Dec 10, 2008 in CISA - Quick Tips
    1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
  • CISA Quick Tips 08-1012
    on Dec 10, 2008 in CISA - Quick Tips
    1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
  • CISA Quick Tips 08-0912
    on Dec 9, 2008 in CISA - Quick Tips
    1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...
  • CISA Quick Tips 08-0912
    on Dec 9, 2008 in CISA - Quick Tips
    1. When data volume is more Symmetric cryptography is fast and suitable method to encrypt such data. 2.Access Control Lists(ACLs) are used in firewalls and in interfaces that connect two or more... [[ This is a content summary only. Visit my websi...
  • CISA Quick Tips 08-0512
    on Dec 8, 2008 in CISA - Quick Tips
    1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...
  • CISA Quick Tips 08-0512
    on Dec 8, 2008 in CISA - Quick Tips
    1. Dry pipe sprinklers are i.very effective fire suppressor ii. environment friendly fire suppressor 2.Security administrator should not have full access/write access to security devices... [[ This is a content summary only. Visit my website...
  • IPsec & EncryptionThis post is in relation to a question asked by reader Question: Angus has left a new comment on your post "IP Security & Authentication Header (AH)": May I ask a question about IPsec? Which... [[ This is a content summary only. Vi
  • IPsec & EncryptionThis post is in relation to a question asked by reader Question: Angus has left a new comment on your post "IP Security & Authentication Header (AH)": May I ask a question about IPsec? Which... [[ This is a content summary only. Vi
  • Audit Risk and Relationship
    on Dec 2, 2008 in IS Audit Process
    This post is in relation to a question asked by a reader Question: Jez4christ has left a new comment on your post "Audit Risk Assessment – Risk Types & Relationships...": Hi, I am reading... [[ This is a content summary only. V
  • Audit Risk and Relationship
    on Dec 2, 2008 in IS Audit Process
    This post is in relation to a question asked by a reader Question: Jez4christ has left a new comment on your post "Audit Risk Assessment – Risk Types & Relationships...": Hi, I am reading... [[ This is a content summary only. V
  • Volatile and Non-volatile memoryThis post is in relation to a question asked by a reader Question: Angus has left a new comment on your post "10 things you must remember about Antivirus": Sorry, I can't find a proper... [[ This is a content summary only. Visit
  • Volatile and Non-volatile memoryThis post is in relation to a question asked by a reader Question: Angus has left a new comment on your post "10 things you must remember about Antivirus": Sorry, I can't find a proper... [[ This is a content summary only. Visit
1
Blogs
0
Followers
0
Following