CISA Made Easy

                                           - easy CISA preparation

Friday, November 21, 2008

CISA Quick Tips 08-2111

1. Data mining is the process of analyzing data from different sources and perspectives and summarizing it into helpful information by means of association, clustering, sequencing and forecasting.

2. RSA algorithm uses message authentication code (MAC) for authenticating the message.

3. IS Policy and Business objective should be mutually supportive

4. IT Security policy should be regularly reviewed and be tuned with the technological changes.

5. Ideal way to monitor relationship between source code and object code is the time stamp comparison.Unauthorized changes can also be detected by time stamp comparison.

Readers who visited this post also read :

0 comments:

 

Home | | | | |

CISA made Easy - Easy CISA Preparation