SlideShare a Scribd company logo
1 of 46
Bank  Audit in IT Environment ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mom, When is my Happy Download Day?
How many times have I told you!  You were not downloaded. You were born…
[object Object],Information Technology has completely changed the way, we lead our lives.
Everyday one trillion dollars worth of money is transacted over the global networks. Money equal to 200 per cent of India’s GDP over a whole year moves over the global financial networks in a single day. ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Banking Applications Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Branch Automation Software ,[object Object],[object Object],[object Object],[object Object]
Total Branch Automation Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Core Banking Solution: ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Physical Environment Vs e-Environment
[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Potential Risk Areas in computerised environment
[object Object],[object Object],[object Object],Advantages over manual system
[object Object],[object Object],[object Object],[object Object],Challenges
[object Object],[object Object],AAS 29
[object Object],[object Object],[object Object],[object Object],[object Object],AAS 29
[object Object],[object Object],[object Object],Controls in Information System Environment
[object Object],[object Object],Application Controls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lock Guard Security: Scenario
Information Security Risk in a Bank Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons:   Sabotage / Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK  Environmental / Physical Threats  E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through:   Hackers/ competitors /   criminals etc. Reasons:   Sabotage /  Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],Thanks for being nice & giving a patient hearing

More Related Content

What's hot

PAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System softwarePAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System softwareMantala
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsPECB
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to knowjennyhollingworth
 
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?browzcompliance
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guideAstalapulosListestos
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous AuditingTianli Xie
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Managementjiricejka
 
Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301PECB
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditingacc626tan
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore.
 
Successful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's PerspectiveSuccessful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's PerspectiveAntea Group
 
Legal Register / Compliance Obligations ISO 14001
Legal Register / Compliance Obligations ISO 14001Legal Register / Compliance Obligations ISO 14001
Legal Register / Compliance Obligations ISO 14001Nimonik
 
BCI ISO 22301 Benchmarking Report
BCI ISO 22301 Benchmarking ReportBCI ISO 22301 Benchmarking Report
BCI ISO 22301 Benchmarking ReportNQA
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
How to Determine the Root Cause Analysis Techniques in a Management System?
How to Determine the Root Cause Analysis Techniques in a Management System?How to Determine the Root Cause Analysis Techniques in a Management System?
How to Determine the Root Cause Analysis Techniques in a Management System?PECB
 
COSP Safety Accountability
COSP Safety Accountability COSP Safety Accountability
COSP Safety Accountability Heatherawarens
 

What's hot (19)

PAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System softwarePAWS - Pentana Audit Work System software
PAWS - Pentana Audit Work System software
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systems
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to know
 
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?[Webinar] Contractor Management: What is the Return on Investment (ROI)?
[Webinar] Contractor Management: What is the Return on Investment (ROI)?
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
EHS Audit Overview
EHS Audit OverviewEHS Audit Overview
EHS Audit Overview
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditing
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 
Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301Leveraging Gap Assessments and Internal Audits in ISO 22301
Leveraging Gap Assessments and Internal Audits in ISO 22301
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditing
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
 
Successful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's PerspectiveSuccessful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's Perspective
 
Osha Manager Role
Osha Manager RoleOsha Manager Role
Osha Manager Role
 
Legal Register / Compliance Obligations ISO 14001
Legal Register / Compliance Obligations ISO 14001Legal Register / Compliance Obligations ISO 14001
Legal Register / Compliance Obligations ISO 14001
 
Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007
 
BCI ISO 22301 Benchmarking Report
BCI ISO 22301 Benchmarking ReportBCI ISO 22301 Benchmarking Report
BCI ISO 22301 Benchmarking Report
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
How to Determine the Root Cause Analysis Techniques in a Management System?
How to Determine the Root Cause Analysis Techniques in a Management System?How to Determine the Root Cause Analysis Techniques in a Management System?
How to Determine the Root Cause Analysis Techniques in a Management System?
 
COSP Safety Accountability
COSP Safety Accountability COSP Safety Accountability
COSP Safety Accountability
 

Viewers also liked

Viewers also liked (8)

Audit
AuditAudit
Audit
 
Bank branch audit
Bank branch auditBank branch audit
Bank branch audit
 
Statutory Bank Branch Audit
Statutory Bank Branch Audit Statutory Bank Branch Audit
Statutory Bank Branch Audit
 
Presentation - Overview of Bank Audit
Presentation - Overview of Bank AuditPresentation - Overview of Bank Audit
Presentation - Overview of Bank Audit
 
Bank audit
Bank auditBank audit
Bank audit
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing Presentation
 
Bank Audit Process
Bank Audit ProcessBank Audit Process
Bank Audit Process
 
Bank audit slideshare
Bank audit   slideshareBank audit   slideshare
Bank audit slideshare
 

Similar to Bankauditin it env

Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentKugendranMani
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDITRos Dina
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lessonAnne ndolo
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized EnvironmentVadivelM9
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfOlivia Wilson
 

Similar to Bankauditin it env (20)

Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Bcbsc136
Bcbsc136Bcbsc136
Bcbsc136
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
 

More from Dr Vijay Pithadia Director

Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesDr Vijay Pithadia Director
 

More from Dr Vijay Pithadia Director (20)

Lecture 6 training development
Lecture 6 training developmentLecture 6 training development
Lecture 6 training development
 
Lecture 5 interviewing candidates
Lecture 5 interviewing candidatesLecture 5 interviewing candidates
Lecture 5 interviewing candidates
 
Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
 
Lecture 2 job aanalysis
Lecture 2 job aanalysisLecture 2 job aanalysis
Lecture 2 job aanalysis
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
 
Performance management
Performance managementPerformance management
Performance management
 
Hr dev performanceappraisal
Hr dev performanceappraisalHr dev performanceappraisal
Hr dev performanceappraisal
 
Dessler hrm12e ppt_11
Dessler hrm12e ppt_11Dessler hrm12e ppt_11
Dessler hrm12e ppt_11
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
 
Session plan
Session planSession plan
Session plan
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
 
Processing cooperatives
Processing cooperativesProcessing cooperatives
Processing cooperatives
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
History of the cooperative movement
History of the cooperative movementHistory of the cooperative movement
History of the cooperative movement
 
Dairy cooperatives
Dairy cooperativesDairy cooperatives
Dairy cooperatives
 
Cooperative
CooperativeCooperative
Cooperative
 
Consumer cooperative
Consumer cooperativeConsumer cooperative
Consumer cooperative
 
Capitalism and socialism
Capitalism and socialismCapitalism and socialism
Capitalism and socialism
 
Banking cooperative
Banking cooperativeBanking cooperative
Banking cooperative
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Bankauditin it env

  • 1.
  • 2.
  • 3. Mom, When is my Happy Download Day?
  • 4. How many times have I told you! You were not downloaded. You were born…
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Information Security Risk in a Bank Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK Environmental / Physical Threats E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through: Hackers/ competitors / criminals etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.