This book prepares candidates testing June 2019 and later. CISA Review Manual, 27th Edition is a comprehensive reference guide designed to help individuals prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor. The manual has been revised according to the 2019 CISA Job Practice and represents the most current, comprehensive, peer-reviewed IS audit, assurance, security and control resource available worldwide. The 27th Edition is organized to assist candidates in understanding essential concepts and studying the CISA 2019 Job Practice Areas. Also included are definitions of terms most commonly found on the exam. This manual is excellent as a stand-alone document for individual study, as a guide or reference for study groups and instructor-led training events, and it can also be used in conjunction with CISA Review Questions, Answers & Explanations Manual, 12th Edition, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription (Available at ISACA.org), CISA Online Review Course (Available at ISACA.org), CISA Virtual or Live Instructor-led Training (Available at ISACA.org)
Work got me reading this. It’s not as interesting as all the other reviews make out. Tough, tough read. Might just fail the exam it’s better than reading this to be honest
The official CISA Exam study resource from ISACA. Just for fun, here’s some unusually-named but 100% real cyberattacks that you need to memorize when studying.
“Smurf attack—Occurs when misconfigured network devices allow packets to be sent to all hosts on a particular network via the broadcast address of the network.”
“Teardrop attack—Involves sending mangled IP fragments with overlapping, oversized payloads to the target machine”
“Banana attack—Redirects outgoing messages from the client back onto the client, preventing outside access, as well as flooding the client with the sent packets”
“Pulsing zombie—A DoS attack in which a network is subjected to hostile pinging by different attacker computers over an extended time period. This results in a degraded quality of service and increased workload for the network’s resources.”
“Juice Jacking - Occurs when malware is surreptitiously installed on, or data are copied from, a smart phone, tablet or other device using an often public USB charging port that doubles as a data connection”
“Logic bomb—A program or a section of a program that is triggered when a certain condition, time or event occurs.”
“Pharming - An attack that aims to redirect the traffic of a website to a bogus website. Pharming can be conducted either by changing the host’s file on a victim’s computer or by exploiting a vulnerability in DNS server software.”
“Piggybacking - The act of following an authorized person through a secured door or electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions.”
“Salami Attack - Involves slicing small amounts of money from a computerized transaction or account.”
“Worms—Destructive programs that may destroy data or use up tremendous computer and communication resources, but worms do not replicate like viruses.”
This is the only reliable book any one should read for cisa exam..how ever..if the content materials would be written in more interesting way, with some examples, colours and diagrams..it would be more interesting to study.
Pretty dry reading. But can't complain too much when it helped me pass the exam despite having no prior IT experience or education to speak of. Would definitely suggest pairing with the review questions to help in your studies.