Follow

Blog is mainly for CISA Preparation.This is highly suited for IS Auditors & Information Security Professionals as it provides foundation of Information Security and IS Audit.

Owner: passcisa

Listed in: Computers

Language: English

Tags: Information Security, IS Audit, CISA, cyber security, cyber crime

Report it


Site Statistics

Unique Visitors Today:
0
Page Views Today:
0
Unique Visitors this Week:
0
Page Views this Week:
0
Unique Visitors this Month:
9
Page Views this Month:
10
Total Unique Visitors:
49,920
Total Page Views:
103,476
Total Hits Out:
300
Traffic Chart

Latest Blog Posts for CISA made Easy - Easy CISA Preparation

  • Links for 2016-08-23 [del.icio.us]
    on Aug 24, 2016
    Sponsored: 64% off Code Black Drone with HD Camera Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!
  • Links for 2016-04-29 [del.icio.us]
    on Apr 30, 2016
    Sponsored: 64% off Code Black Drone with HD Camera Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!
  • Business Continuity Planning (BCP)– Essential Steps
    on Jan 5, 2009 in BCP and DRP
    Disaster can happen anytime to any strong setup. The best way to provide stability is by establishing mechanisms to provide continuity to all critical Operations. This can be achieved by a proper... [[ This is a content summary only. Visit my websit...
  • Business Continuity Planning (BCP)– Essential Steps
    on Jan 5, 2009 in BCP and DRP
    Disaster can happen anytime to any strong setup. The best way to provide stability is by establishing mechanisms to provide continuity to all critical Operations. This can be achieved by a proper... [[ This is a content summary only. Visit my websit...
  • Passing CISA is easy - final tips to pass CISAAll your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
  • Passing CISA is easy - final tips to pass CISAAll your queries and hits has made me to devote more and more time for this blog and this blog has become a vital part of my life. Thanks for your support. Now examination is standing next to... [[ This is a content summary only. Visit my webs...
  • CISA Quick Tips 08-1112
    on Dec 11, 2008 in CISA - Quick Tips
    1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
  • CISA Quick Tips 08-1112
    on Dec 11, 2008 in CISA - Quick Tips
    1. Asymmetric key cryptography is known as Public key encryption and involves a private key and a public key. 2. A good Backup and recovery System should have following features: i. Backup... [[ This is a content summary only. Visit my websit...
  • CISA Quick Tips 08-1012
    on Dec 10, 2008 in CISA - Quick Tips
    1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
  • CISA Quick Tips 08-1012
    on Dec 10, 2008 in CISA - Quick Tips
    1. The purpose of setting, Disaster Recovery Site is to avoid Single Point of failure and maitain Business Continuity. 2. Logical Access & Physical Access Audit must include authorization as per... [[ This is a content summary only. Visit my we.
Loading Comments...

Comments

{ds_PageTotalItemCount} commentcomments
{pvComments::date}
{pvComments::comment}

Post a Comment

Close