CISA Domain: 3-Information Systems Acquisition, Development and Implementation
Jump to navigation
Jump to search
- 12% of exam
- 3.2 CISA: Benefits Realization
- 3.3 CISA: Project Management Structure
- 3.4 CISA: Project Management Practices
- 3.4.1 CISA: Initiation of a Project
- 3.4.2 CISA: Project Planning
- System Development Project Cost Estimation
- Software Size Estimation
- Function Point Analysis
- FPA Feature Points
- Cost Budgets
- Software Cost Estimation
- Scheduling and Establishing the Time Frame
- Critical Path Methodology
- Gantt Charts
- Program Evaluation Review Technique
- Timebox Management
- 3.4.3 CISA: Project Execution
- 3.4.4 CISA: Project Controlling
- Management of Scope Changes
- Management of Resource Usage
- Management of Risk
- 3.4.5 CISA: Closing a Project
- 3.5 CISA: Business Application Development
- 3.5.1 CISA: Traditional SDLC Approach
- 3.5.2 CISA: Description Of Traditional SDLC Phases
- Phase 1—Feasibility Study
- Phase 2—Requirements Definition
- Phase 3A—Software Selection and Acquisition
- Phase 3B—Design
- Phase 4A—Configuration
- Phase 4B—Development
- Phase 5—Final Testing and Implementation
- Phase 6— Post-Implementation Review
- 3.5.3 CISA: Integrated Resource Management Systems
- 3.5.4 CISA: Risk Associated With Software Development
- 3.6 CISA: Virtualization and Cloud Computing Environments
- 3.6.1 CISA: Virtualization
- Key Risk Areas
- Typical Controls
- 3.6.1 CISA: Virtualization
- 3.7 CISA: Business Application Systems
- 3.7.1 CISA: E-Commerce
- E-Commerce Models
- 3.7.2 CISA: Electronic Data Interchange
- General Requirements
- Traditional EDI
- Web-Based EDI
- 3.7.3 CISA: EDI Risk and Controls
- 3.7.4 CISA: Controls in The EDI Environment
- Receipt of Inbound Transactions
- Outbound Transactions
- Auditing EDI
- 3.7.5 CISA: Email
- Security Issues of Email
- Standards for Email Security
- 3.7.6 CISA: Point-of-sale Systems
- 3.7.7 CISA: Electronic Banking
- Risk Management Challenges in E-banking
- Risk Management Controls for E-banking
- 3.7.8 CISA: Electronic Finance
- 3.7.9 CISA: Payment Systems
- Electronic Money Model
- Electronic Checks Model
- Electronic Transfer Model
- 3.7.10 CISA: Integrated Manufacturing Systems
- 3.7.11 CISA: Electronic Funds Transfer
- Controls in an EFT Environment
- 3.7.12 CISA: Automated Teller Machine
- Audit of ATMs
- 3.7.13 CISA: Interactive Voice Response
- 3.7.14 CISA: Purchase Accounting System
- 3.7.15 CISA: Image Processing
- 3.7.16 CISA: Industrial Control Systems
- Risk Factors
- Typical Controls
- 3.7.17 CISA: Artificial Intelligence and Expert Systems
- 3.7.18 CISA: Business Intelligence
- Business Intelligence Governance
- 3.7.19 CISA: Decision Support System
- Efficiency vs. Effectiveness
- Decision Focus
- DSS Frameworks
- Design and Development
- Implementation and Use
- Risk Factors
- Implementation Strategies
- Assessment and Evaluation
- DSS Common Characteristics
- DSS Trends
- 3.7.20 CISA: Customer Relationship Management
- 3.7.21 CISA: Supply Chain Management
- 3.7.1 CISA: E-Commerce
- 3.8 CISA: Development Methods
- 3.8.1 CISA: Use of Structured Analysis, Design and Development Techniques
- 3.8.2 CISA: Agile Development
- 3.8.3 CISA: Prototyping-evolutionary Development
- 3.8.4 CISA: Rapid Application Development
- 3.8.5 CISA: Object-oriented System Development
- 3.8.6 CISA: Component-based Development
- 3.8.7 CISA: Web-based Application Development
- 3.8.8 CISA: Software Reengineering
- 3.8.9 CISA: Reverse Engineering
- 3.9 CISA: Infrastructure Development/Acquisition Practices
- 3.9.1 CISA: Project Phases of Physical Architecture Analysis
- Review of Existing Architecture
- Analysis and Design
- Draft Functional Requirements
- Vendor and Product Selection
- Writing Functional Requirements
- Proof of Concept
- 3.9.2 CISA: Planning Implementation of Infrastructure
- Procurement Phase
- Delivery Time
- Installation Plan
- Installation Test Plan
- 3.9.3 CISA: Critical Success Factors
- 3.9.4 CISA: Hardware Acquisition
- Acquisition Steps
- 3.9.5 CISA: System Software Acquisition
- 3.9.6 CISA: System Software Implementation
- 3.9.1 CISA: Project Phases of Physical Architecture Analysis
- 3.10 CISA: Information Systems Maintenance Practices
- 3.10.1 CISA: Change Management Process Overview
- Deploying Changes
- Documentation Testing Changed Programs
- Auditing Program Changes
- Emergency Changes
- Deploying Changes Back Into Production
- Change Exposures (Unauthorized Changes)
- 3.10.2 CISA: Configuration Management
- 3.11 CISA: System Development Tools and Productivity Aids
- 3.11.1 CISA: Code Generators
- 3.11.2 CISA: Computer-aided Software Engineering
- 3.11.3 CISA: Fourth-generation Languages
- 3.10.1 CISA: Change Management Process Overview
- 3.12 CISA: Process Improvement Practices
- 3.12.1 CISA: Business Process Reengineering and Process Change Projects
- BPR Methods and Techniques
- BPR Audit and Evaluation
- 3.12.2 CISA: ISO/IEC 25010:2011
- 3.12.3 CISA: Capability Maturity Model Integration
- 3.12.4 CISA: ISO/IEC 330XX Series
- 3.12.1 CISA: Business Process Reengineering and Process Change Projects
- 3.13 CISA: Application Controls
- 3.13.1 CISA: Input/Origination Controls
- Input Authorization
- Batch Controls and Balancing
- Error Reporting and Handling
- 3.13.2 CISA: Processing Procedures and Controls
- Data Validation and Editing Procedures
- Processing Controls
- Data File Control Procedures
- 3.13.3 CISA: Output Controls
- 3.13.4 CISA: Business Process Control Assurance
- 3.13.1 CISA: Input/Origination Controls
- 3.14 CISA: Auditing Application Controls
- 3.14.1 CISA: Flow of Transactions Through the System
- 3.14.2 CISA: Risk Assessment Model to Analyze Application Controls
- 3.14.3 CISA: Observing and Testing User Performing Procedures
- 3.14.4 CISA: Data Integrity Testing
- 3.14.5 CISA: Data Integrity in Online Transaction Processing Systems
- 3.14.6 CISA: Test Application Systems
- 3.14.7 CISA: Continuous Online Auditing
- 3.14.8 CISA: Online Auditing Techniques
- 3.15 CISA: Auditing Systems Development, Acquisition and Maintenance
- 3.15.1 CISA: Project Management
- 3.15.2 CISA: Feasibility Study
- 3.15.3 CISA: Requirements Definition
- 3.15.4 CISA: Software Acquisition Process
- 3.15.5 CISA: Detailed Design and Development
- 3.15.6 CISA: Testing
- 3.15.7 CISA: Implementation Phase
- 3.15.8 CISA: Post-implementation Review
- 3.15.9 CISA: System Change Procedures and the Program Migration Process