SlideShare uma empresa Scribd logo
1 de 77
Baixar para ler offline
CA Final : Group – II
Paper – 6 – ISCA
Information System Control & Audit
Fast Track Notes
CA - final
INFORMATION TECHNOLOGY
- INEVITABLE PART OF LIFE
Contact : (+91) 8671866086
Email : ca.vrtalsaniya.com
Slide-share : VR Talsaniya
Linkedin : Vijay Talsaniya
Facebook : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya)
We Need to Control Technology,
Otherwise, Technology will Control us.
For - May 2017
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
Objec ves of ISCA:
1) Iden fy & review IT Risks & controls
2) Assess Impact on organiza onal structure of technology integra on
3) Understand & apply IT Best prac ces
4) Assess Informa on system acquisi on, development and implementa on strategy
5) Assess BCP of organiza on from Going concern perspec ve
6) Understand key Concepts of Governance, Risk and Compliance (GRC)
7) Understand how to perform Audit - collec on and evalua on of evidence in IT environment
1. Explain - Key concepts of Governance
Ans.:
Various defini ons related to governance:
A. Governance :
Stakeholders evaluate op ons set direc ons monitor compliance to meet objec ves
B. Enterprise Governance :
Set of responsibili es exercised by board or execu ve management
For…
a. Providing strategic direc on
b. Ensuring objec ve achieved
c. Risk managed property
d. Organiza on’s resources are used responsibly
C. Corporate Governance :
A system by which a company / enterprise is directed & controlled to achieve the
objec ve of increasing shareholder value by enhancing economic performance.
D. IT Governance:
A system by which IT ac vi es in a company on enterprise are directed & controlled to
achieve business objec ves with the ul mate objec ve of mee ng stakeholder needs.
2. What is the Rela onship between Corporate governance and IT governance?
Ans.:
A. Strategic alignment of IT & business objec ves is cri cal success factor
B. IT provide inputs and informa on to meet enterprise objec ve
C. Objec ves of IT governance is similar to Corporate governance but with focus on IT
D. Inseparable rela onship between both
3. What are the Benefits of Governance?
Ans.:
A. Rela onship improvement among customers, business and internal rela onship
B. Aligned decision making for IT principles
C. Achieving objec ve of enterprise by ensuring each element assigned with decision
rights and accountability
D. Encouraging Desired behavior in the use of IT
E. Integra ng desired business processes into enterprise
F. Overcoming limita ons of the organiza onal structure
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
4. What are the Benefits of IT Governance?
Ans.:
A. Increased value delivered through enterprise IT
B. Increased user sa sfac on with IT services
C. Increased agility in suppor ng business needs
D. Increased management & mi ga on of IT related business risk
E. Increased transparency & understanding of IT’s contribu on to the business
F. Be er cost performance of IT
G. IT becoming an enabler for change
H. Improved compliance with law, regula ons & policies
I. More op mal u liza on of IT resources
5. Explain - Governance Dimensions
Ans.:
A. Conformance Dimensions :
(Corporate Governance Dimension)
1) Focus on regulatory requirements - Historic
2) Covers areas of Role and composi on of Board, Board commi ees
3) Regulatory requirements and standards are addressed in this dimension.
Example Sarbanes Oxley Act of US and Clause 49 lis ng requirement of SEBI
B. Performance Dimensions :
(Business Governance Dimension)
1) Focus on strategy and value crea on – Forward Looking
2) Helping the board to make strategic decisions, understand risk appe te
3) This dimension not governed by any standard
C. Comparisons :
1) Conformance dimension monitored by audit commi ee
2) No such dedicated mechanism for Performance dimension. It is the responsibility of
full board
6. What are the Key Func ons of IT Steering commi ees?
Ans.:
A. Long & short range IT plans in tune with enterprise objec ve
B. Measuring results of IT projects in terms of ROI
C. Size and scope of IT func ons
D. Approve Deployment of major IT projects
E. Viable communica on system between IT and its users
F. Approve Standard policy & procedures
G. Review the status of IS Budget and IT performance
H. Facilitates Implementa on of IT security within enterprise
I. Report to the board of directors on IT ac vi es
J. Decisions on key aspects of IT deployment
3 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
7. What are the Benefits of GEIT (Governance of Enterprise IT)?
Ans.:
A. IT Processes are effec ve and transparent
B. Confirm Compliance with legal and regulatory requirements
C. Consistent Approach aligns with enterprise governance approach
D. Governance Requirement for board member are met
E. IT related Decisions are in line with enterprise objec ves
8. What are the Key prac ces for status of IT Governance determina on?
Ans.:
A. Who makes IT Management related decisions? (Direc ng, Controlling etc.)
B. What informa on is required to make decision?
C. What approach is used for DM? OR How the decisions are made?
D. What DM mechanisms are required?
E. How the excep ons are handled?
F. How the IT governance results are monitored & improved?
9. Explain - Key prac ces of GEIT?
Ans.: (EDM)
A. Evaluate governance system
B. Direct governance system
C. Monitor governance system
10.What are the Key prac ces to evaluate business value from IT?
Ans.: (EDM)
A. Evaluate value op miza on
B. Direct value op miza on
C. Monitor value op miza on
11.Which Key Metrics can be used for evalua ng benefits realized from IT enabled
investments?
Ans.:
Key metrics for value op miza on monitor:
Business value is achieved by the benefit (in the form of ‘Op mal value’) to the business
from the business processes and IT enabled investments at acceptable cost.
Metrics:
A. % of IT enabled Investments – where benefits monitored
B. % of IT Services – where benefits realized
C. % of IT enabled Investments – where benefits met /exceeded
D. % of IT enabled Investments – where IT cost & benefits defined
E. Sa sfac on survey of key stakeholders
F. % of IT services – where Opera onal cost & benefits defined
4 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
12.Explain - Key Governance prac ces - Risk Management?
Ans.: (EDM)
A. Evaluate – Risk Management
B. Direct – Risk Management
C. Monitor – Risk Management
13.What are the Best prac ces of corporate governance?
Ans.:
A. Assignment of responsibili es and decision making from individual to board of directors
B. Mechanism for interac on among board of directors and senior management
C. Implemen ng strong Internal control and risk management func ons
D. Monitoring of Risk exposure in areas of conflict of interest
E. Incen ves to senior management and employees in form of compensa on, promo on
F. Informa on flow internally and to the public in appropriate manner
14.Explain - Enterprise Risk Management (ERM)
Ans.:
Defini on of ERM:
“Enterprise Risk Management is process affected by en ty’s Board of directors and applied
across the enterprise to iden fy poten al events that may affect the en ty and to manage
risk within risk appe te and provide assurance of achieving en ty objec ve.
15.What are the Components of internal controls as COSO?
Ans.:
(As per COSO – Same concept in Audit) – CRC IM
A. Control Environment:
The control consciousness of organiza on i.e. atmosphere
B. Risk Assessment:
Iden fy & analyze risks faced by an org. to manage them.
C. Control Ac vi es:
Ac ons to manage & Reduce risk assessed
D. Monitoring:
Elements that ensure internal controls operate reliably over a me
E. Informa on & Communica on:
Informa on Iden fied, captured & exchanged in mely & appropriate form to discharge
responsibility.
16.What are the Categories of Strategic Planning:
Ans.: (I – ERA)
A. IS Strategic plan
B. Enterprise Strategic plan
C. IS Requirements plan
D. IS Applica ons & facili es plan
5 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
17.Which are the Enablers of IS Strategic Plan?
Ans.:
A. Business strategy of enterprise
B. How IT support business objec ve
C. Assessment of exis ng system
D. Inventory of technological solu ons & current infrastructure
E. Enterprise Posi on on Risk
F. Need for senior management support, cri cal review
18.Which are the Enablers of IS Requirement Plan?
Ans.:
A. Data Syntax rules
B. Automated data repository and dic onary
C. Informa on Model represen ng business
D. Data Ownership and security classifica on
E. Informa on Architectural Standard
19.Explain - Key management prac ces for aligning IT strategy with Enterprise strategy?
Ans.:
A. Understand enterprise Direc on
B. Assess the Current Environment, capabili es and performance
C. Define the Target IT capabili es
D. Conduct Gap analysis
E. Define the Road map and strategic plan
F. Communicate IT strategy and direc on
20.Explain - Risk Management: (also covered in chapter – 4)
Ans.:
 IS Risks can be in the form inadequate disclosure, increasing electronic frauds etc.
 IT based Informa on system is subject to Inherent risks.
 Inherent risks are risks which cannot be eliminated but can be mi gated by appropriate
security
 Risk management is ‘Assessing risks’ and ‘Reducing to an acceptable level’ through
appropriate security/ controls.
 Controls are classified as Preven ve, Detec ve and Correc ve appropriate security/
controls assures that –
A. CIA (Confiden ality, Integrity and Availability ) of data is maintained
B. Access to data is restricted to authorized users only
C. Computer facili es are available at all mes
6 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
21.What are the Sources of Risks?
Ans.:
Common sources are… (NEP TC MIH)
A. Natural events
B. Economic events
C. Poli cal Circumstances
D. Technology & Technological issue
E. Commercial & legal Rela onship
F. Management ac vity & Control (Internal Factor)
G. Individual Ac vi es
H. Human Behavior
22.Explain - Reasons for Gap between Need to protect system and protec on applied?
Ans.:
1) External dangers from Hackers
2) Inter connec vity of systems
3) Devolu on of management & control
4) Elimina on of Time, Distance, Space constraints
5) Widespread Use of technology
6) Unevenness of technological Changes
7) Growing poten als fir Misuse
23.Explain - Risk Management Strategies
Ans.:
A. Turn back / ignore – When very low impact
B. Tolerate / Accept – When minor, Periodical review required
C. Terminate / Eliminate – by Replacement
D. Transfer / Share – by Sharing with partner
E. Treat / Mi gate – Eliminate from the origin
24.Explain - Key Management prac ces - Risk Management:
(Check Q-12: if Key Governance Prac ces, than, Ans. = EDM)
Ans.:
A. Collect Data
B. Analyze Risk
C. Maintain Profile of Risk
D. Ar culate Risk
E. Define Ac on Por olio of Risk management
F. Respond to Risk
7 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
25.Explain - Key Metrics of Risk Management (RM)
Ans.:
A. % of Cri cal business process covered by risk assessment
B. Numbers of IT related Incidents not iden fied in risk assessment
C. % of Enterprise risk assessments
D. Frequency of Upda ng risk profile
26.What are the Key Management prac ces of IT Compliance?
Ans.: ( I O C O )
A. Iden fy External compliance Requirement
B. Op mize response to External Requirement
C. Confirm External Compliance
D. Obtain assurance of External Compliance
27.Explain - Key Metrics for assessing compliance with External laws?
Ans.:
A. Cost of IT non-compliance (se lement fines)
B. Repor ng to the board of IT non-compliance
C. Non-compliance related to Agreement with IT service providers
D. Coverage of compliance assessment
28.Explain - Key Metrics for compliance with Internal Policies?
Ans.:
1) Incidents related to non-compliance to policy
2) % of stake holders who Understand policies
3) % of policies supported by effec ve Standards
4) Frequency of policies review
29.What are the needs for use of COBIT 5 by enterprises?
Ans.: GEIT Framework - COBIT 5 (Control OBjec ve for Informa on & related Technology)
Need for use of COBIT 5 by enterprises:
A. Development of Business focused IT solu ons
B. Reduce IT related risks
C. Enterprise wide involvement in IT related ac vi es
D. Value crea on from use of IT
E. Compliance with Laws & regula ons
30.Explain - 5 Principles of COBIT 5:
Ans.:
A. Mee ng Stakeholders needs
B. Covering Enterprise End –to-End
C. Applying a Single Integrated framework
D. Enabling a Holis c approach
E. Separa ng Governance from Management
8 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
31.Explain - 7 Enablers of COBIT 5:
Ans.:
A. Principles, Policies and Framework - translates desired behavior into prac cal guidance
for day-to-day management
B. Processes - describes organized set of prac ces to achieve certain objec ves
C. Organiza onal structure - are key decision making en es in enterprise
D. Culture, Ethics and Behavior - of the individuals o en underes mated as a success factor
E. Informa on - is pervasive throughout the organiza on
F. Services, Infrastructure and Applica ons - provides enterprise with informa on
technology processing and services
G. People, Skills and Competencies - are linked to people and are required for successful
comple on of all ac vi es and taking correc ve decisions
32.What are the Components of COBIT 5?
Ans.:
A. Framework - Organize It governance objec ves, good prac ces and links them to
business requirement
B. Process Descrip on – ‘Reference process model’ and ‘Common language’ for everyone in
organiza on
C. Control Objec ves – Provide set of high level requirements for effec ve control of each
IT process
D. Management guidelines - Helps assign responsibili es, agree on objec ves and measure
performance
E. Maturity Models - Assesses maturity and capability per process and helps to address
gaps
33.Explain - Benefits of COBIT 5
Ans.:
A. Enables It to be governed in Holis c manner for en re organiza on taking full end-to-
end business
B. Comprehensive Framework enables enterprise in achieving objec ves
C. Enables increased Business user sa sfac on and clear policy development
D. Enables enterprise to create Op mal value from IT by maintaining balance between
realizing benefits and op mizing risks levels
E. Enables enterprise to Manage IT related risks and ensure compliance
F. Generic Framework hence useful for enterprises of all sizes, whether Commercial, Non-
profit or Public sector
9 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 1 : Governance & Management of ISs
34.Goals used to measure successful Implementa on of GRC:
Ans.:
A. Redundant (extra) controls - Reduc on
B. Control failures in key areas - Reduc on
C. Expenditure related to Legal, Regulatory areas - Reduc on
D. Overall me for audit of key business areas - Reduc on
E. Streamlining of processes and me reduc on through automa on
F. Repor ng of compliance issues and remedia on in mely manner
G. Compliance status and key issues to senior management on real me basis
35.Several Key components evaluated by Internal auditor for Effec ve IT governance:
Ans.: (L O PR PC)
1) Leadership -
2) Organiza onal structure –
3) Processes –
4) Risks -
5) Performance Measurement -
6) Controls –
---- XXXX ---- XXXX ----
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
1. What is informa on?
Ans.:
In simple term, Processed data = Informa on
Informa on is the data that has been processed into the form that is meaningful to recipient
and is of real & perceived value in current and progressive decision.
2. Explain - A ributes of Informa on
Ans.: (A PM VRT C Frequently Quality of CRV)
A. Availability
B. Purpose / Objec ve
C. Mode & Format
D. Validity
E. Reliability
F. Transparency
G. Current / Updated
H. Frequency
I. Qualita ve (Presenta on, Timeliness, Place & Possession – U lity)
J. Completeness & Adequacy
K. Rate of Transmission
L. Value of Informa on (CBA – Cost Benefit Analysis)
3. Explain - Role of Informa on in Business
Ans.: Factors decide Informa on requirements
A. Opera on Func ons
Produc on, Finance& Marke ng
B. Types of DM
Structured, Unstructured and Semi-Structured
C. Level of Business: (As follow)
No Level
Info.
Required
Role of Info. Types of DM
Exp. of
IS
1 Top
Strategic
Info.
Essen al for long term
planning
(Major Policy Decision)
Exp.
For Launching new product,
1. Customer buying habit ,
2. Combina on / Type
3. Loca on / Area
4. Price, Profit etc.
For
Unstructured
DM
EIS, DSS
2 Middle
Tac cal
Info.
1. Help in Smoothen
implementa on of decision
taken by Top Mgt
2. Short term planning
For Semi
Structured
DM
MIS
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
3 Bo om
Opera onal
Info.
1. For smooth running of day
to day ac vity
2. Improve opera onal
efficiency & effec veness
For
structured
DM
TPS,
PCS,
ECS
4. What are the dimension / Value of Informa on?
Ans.: (EBT)
A. Economic –
Cost Benefit Analysis (Benefit of from Info. – Cost of deriving Info. = Net Benefit)
B. Business –
Different types of info. Used at difference level of management (as above)
C. Technical –
Concern for security of info, rela ng to DBMS, Storage, Process & Retrieval etc.
5. Explain - Types of Informa on
Ans.:
A. External / Environmental Info. –
Derived from outside the organiza onal boundary. Primarily from… (MET-G)
I. Major factors of Produc on
II. Economic trends
III. Technological Environment
IV. Government Policies
B. Internal Info. –
Derived from internal func ons of the organiza on (Main source is TPS)
6. Explain - System
Ans.:
A system is a group of interrelated and interdepended components, working together, to
achieve common goal of the system, by accep ng inputs, processing it & providing desired
outputs.
7. What are the Types of System?
Ans.:
There 8 types
Based on 4 bases
3 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
8. What are the types of system based on output from system?
Ans.:
Determinis c System:
 A determinis c system operates in a predictable manner wherein the interac on among
the parts is known with certainty.
 If one has a descrip on of the state of the system at a given point in me plus a
descrip on of its opera on, the next state of the system may be given exactly, without
error.
 Example:-
A computer program, which performs exactly according to a set of instruc ons.
Probabilis c System:
 The probabilis c system can be described in terms of probable behavior, but a certain
degree of error is always a ached to the predic on of what the system will do.
 Example:-
A set of instruc ons given to a human who, for a variety of reasons, may not follow the
instruc ons exactly as given.
9. Sub-system & Supra System
Ans.:
Sub-system: A system is divided into smaller system (Decomposi on Concept)
Supra System: A system immediately above a sub-system (Integra on Concept)
10.Informa on System / Computer Based Informa on System (CBIS)
Ans.:
IS is a combina on of people, HW, SW, Communica on Devices, Data Sources , Network etc
that processes data& informa on for specific purpose.
Components of CBIS
A. Peoples – IT Professional, Programmers, System Administra on & Users
B. Computer System – HW & SW
C. Data
D. Network
11.Characteris cs of CBIS
Ans.:
A. Includes no. of sub-system & cannot work in isola on
B. One sub system fails = whole system may fails
C. Sub system with other = interac on, for common goal
D. All system has common goal, even system designed and developed accordingly
E. Works in integra on & common goal is more important than individual goal
12.Major area of computer based applica ons
Ans.:
A. Finance & Accoun ng
B. Marke ng & Sales
C. HRM
4 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
D. Inventory / Stores Management
E. Produc on / Manufacturing
13.Applica ons of IS in business OR Vital roles in business firm
Ans.: i.e. to support..
A. An organiza on’s Business Processes & Opera ons
B. Business DM
C. Strategic Compe ve Advantages
14.To manage IS effec vely & efficiently, Manager should have knowledge of following
Ans.:
Managers are not required complete understanding of complex, technologies, concepts &
specific applica on but know knowledge…
A. Fundamental Concepts
B. Informa on Technology (Opera on & Development of HW/SW/data etc.)
C. Business applica on of IT
D. Development Processes (Business IT solu ons to the problems)
E. Management challenges
15.Difference of IS & IT
Ans.:
IT is sub system / component of IS, i.e. To produce, store, communicate & manage the
informa on by using computer / CPU.
16.TPS – Transac on Processing System
Ans.:
 At the lowest level of management
 Manipulates data from business transac ons
 Ac vi es:
 Capturing, Processing, Generate Report & Processing of Queries
TPS – Component
1. Input, 2. Processing, 3. Storage 4. Output
17.Features of TPS (SAB-L)
Ans.:
A. Source of input from other system
B. Automa on of basic opera on
C. Benefits are easily measurable
D. Large volume of data
18.PCS – Process Control System
Ans.:
 Computer is used to control on going physical process
 Automa c decision for control (may be by AI)
5 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
19.ECS – Enterprise Collabora on System
Ans.:
This system uses a variety of technologies to help people work together.
It supports - Communica on of ideas, share resources, Co-ordinate co-opera ve work
efforts.
20.MIS – Management Informa on System
Ans.:
An integrated user-machine system designed for providing informa on to support
Opera onal Control, Management Control & Decision Making (DM) func ons in an
organiza on.
21.Characteris cs of effec ve MIS
Ans.:
A. Management Oriented
B. Management Directed
C. Computerized
D. Common Data Flow
E. Common Database
F. Sub-system concepts
G. Integrated
H. Long term / Heavy planning element
I. Need based system
J. Excep on based (flexible for excep on)
22.What are the misconcep ons about MIS?
Ans.:
A. CBIS = MIS
B. Benefits of technologies
C. Study of MIS = use of computers
D. Any Repor ng system = MIS
E. Accuracy in Repor ng = Prime Importance of MIS
F. More Data = More Informa on
G. MIS = Management Technique
H. Implementa on of organiza onal system & procedures
I. It is file structure
23.Prerequisites of effec ve MIS
Ans.:
A. Database
B. Qualified ‘System & Management Staff’
C. Support from Top-M (Top Management)
D. Control & Maintenance of MIS
6 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
24.Evalua on of MIS (Points to be considered while evalua ng MIS)
Ans.:
A. Examine flexibility to cope with expected / unexpected future change
B. View about – Capabili es & Deficiencies
C. Guiding – Appropriate authority about steps to be taken for maintenance of effec ve
MIS
25.Constrains in the way opera ng MIS
Ans.:
A. Non availability of Experts
B. Co-opera on from staff
C. Varied objec ve = not standard objec ve
D. Experts usually face the problem of selec ng subsystem
26. Limita on of MIS
Ans.:
A. Quality of output is governed by quality of input.
B. MIS may not have requisite flexibility.
C. Less useful for unstructured / semi structured problem (non-programmed decisions)
D. MIS cannot provide tailor-made informa on packages
E. Considered only quan ta ve details
F. MIS is not a subs tute for effec ve management
G. Hoarding culture = Reduce effec veness
H. Changes in Top-M = Reduce effec veness
27.DSS – Decision Support System
Ans.:
Computerized informa on System that supports ‘Business & Organiza onal DM Ac vi es’
28.Characteris cs of DSS
Ans.:
A. Supports DM
B. Focuses on DM
C. Used for DM
D. Used for group DM
E. Flexible & adaptable
F. Extensive & evolve over a me
G. Can be used for ‘Structured Problem’ (Effec ve at Top-M)
H. User friendly
I. Easy to use
29.Components of DSS
Ans.:
1. Users, 2. Database, 3. Planning Language 4. Model Base
7 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
30.Examples of DSS in Accoun ng
Ans.:
A. Cos ng
B. Capital Budge ng
C. Capital variance analysis system
D. General DSS
31.Difference between DSS & Tradi onal MIS
Ans.:
No Points DSS MIS
1 Focus DM Process Informa on requirement analysis
2 Used for
Unstructured /
Semi-structured DM
Structured DM
3 Orienta on External Internal
4 Flexibility High Rela vely Low
5 Analy cal High Low
6 Provide
Integrated tools, data models &
language to users
Structured informa on to end
users
32.EIS – Execu ve Informa on System
Ans.:
Used specifically by Top-M
The powerful focus of an EIS is due to the saying “what gets measured gets done.”
33.Characteris cs of EIS
Ans.:
A. Future orienta on
B. Informal source
C. Lack of structure
D. Low level of details
E. High level of uncertainly
34.Content of EIS
Ans.:
Whatever is appropriate to include in EIS (interes ng to execu ves)
For that we have 6 Principles to guide design of EIS:
A. Easy to understand & collect
B. Based on balanced view
C. Encourage to Management & Staff – to share Ownership
D. Evolve to meet changing demands
E. Performance indicator must reflect ‘Everyone’s contribu on’
F. Informa on available to Everyone
8 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
35.OAS – Office Automa on System
Ans.:
Ac vi es for OAS
A. Document Capture
B. Document Crea on
C. Receipts & Distribu on i.e. Correspondence
D. Filling, Search, Retrieval & Follow up
E. Calcula ons
F. Recording U liza on of Resources
36.ES – Expert system
 An Expert System is highly developed DSS that u lizes knowledge generally possessed by
an expert to share a problem.
 Expert Systems are so ware systems that imitate the reasoning processes of human
experts and provide decision makers with the type of advice they would normally receive
from such expert systems.
Need of Expert System:
1. Expert labor is expensive and scarce. Knowledge workers employee, who rou nely work
with data and informa on to carry out their day-to-day du es are not easy to find and
keep and companies are o en faced with a shortage of talent in key posi ons.
2. Moreover, no ma er how bright or knowledgeable certain people are, they o en can
handle only a few factors at a me.
3. Both these limita ons imposed by human informa on processing capability and the
rushed pace at which business is conducted today put a prac cal limit on the quality of
human decision making this pu ng a need for expert systems.
9 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 2 : ISs Concepts
37.ERP – Enterprise Resource Planning
Ans.:
 Now, firms are replascing legacy stems with newer client / server based solu ons
 Main feature is integrated so ware.
 ERP is one of the latest high end solu ons that seek to streamline & integrate opera on
processes & informa on flows in the company to synergize five major resources of
organiza on i.e. Men, Money, Market, Machine & Material.
 ERP is a fully integrated business management system
that integrates the core business & management processes
to provide an organiza on a structured environment
in which decisions about demand, supply, personnel, finance, logis cs etc. are fully
supported by Accurate & Reliable Real me informa on.
 An ERP system is mul -module so ware that integrates all business processes &
func ons of the en re enterprise in “A single So ware System” using a single
integrated database.
 Modules of ERP:
1. Finance & Accoun ng System
2. Produc on
3. Marke ng
4. Payroll
5. Quality Control
6. CRM – Customer Rela onship Management
7. Logis c & SCM – Supply Chain Management
8. Cost Controls & Investment Management etc.
 Components of ERP Module:
1. So ware Component
2. Process Flow
3. Customer Mindset
4. Change Management
---- XXXX ---- XXXX ----
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
1. What is informa on security?
Ans.:
The protec on of valuable assets against loss, damage & disclosure
Where valuable assets = Data /informa on recorded, processed, stored, shared, transmi ed
/ retrieved from an e-medium.
i.e. Security of data / info. While transmi ed through e-medium.
2. What is the Informa on security objec ve?
Ans.:
The protec on of the interest of those relying on informa on &
Protect ‘the IS & Communica ons that deliver informa on’ from harm resul ng from failure
of CIA – Confiden ality, Integrity & Availability.
3. What informa on is sensi ve? OR
Provide best examples of cri cal informa on for organiza on.
Ans.:
A. Strategic Plans
B. Business Opera ons
C. Finance
4. What is Informa on Security Policy?
Ans.:
 The statement…
of inten on by management about
‘How to protect a company’s informa on assets’.
 Should be in wri en form.
 This is a formal statement of Rules.
 Does not specify technologies / specific solu ons but it defines “set of inten ons &
condi ons that help to protect company’s informa on assets & its ability to conduct
business”.
 The essen al founda on for an effec ve & comprehensive informa on security
program.
5. How to implement policy in any organiza on?
Ans.:
Tools to implement policy in any organiza on… (SGP)
A. Standards (Uniform & Compulsory)
Specify technologies & methodologies to be used to secure systems
B. Guidelines (Best Prac ces & Op onal)
Help in smooth implementa on of informa on security policy & Standards
C. Procedures (Detailed Steps to be followed)
More detailed steps to be followed to accomplish par culars security related tasks
Such procedure normally assists in implemen ng applicable Info. Sec. Policy
Opera onal & Compulsory instruc ons to be followed
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
6. For what aspects policy is required?
Ans.:
A. Use of IS resources
B. Physical Security
C. Data Security
D. Online Security
E. Micro computer use
F. Review, evaluate & purchase of Hardware & So ware
G. System Development Method
H. Applica on Program Changes
7. What is the objec ve of controls?
Ans.:
To reduce / if possible eliminate
The causes of the exposure to poten al loss
i.e. A. Error & Omission
B. Improper Authoriza on & Accountability
C. Inefficient Ac vity
Two Main Purposes:
A. Outline policies of the organiza on as laid down by Management
B. A benchmark for evalua on ‘Whether control objec ves are achieved?’
8. Which controls is lack in CBIS?
Ans.: Lack of controls in CBIS:
A. Lack of Management understanding of IS Risks
B. Absence / inadequate ‘Framework for IS controls / general controls
C. Absence of / Weak IS controls / general controls
D. Lack of awareness & knowledge of IS controls / general controls
E. Complexity of implementa on of controls in distributed compu ng environment
F. Lack of control feature / their implementa on in highly technology driven environment
G. Inappropriate technology implementa on / inadequate security func onality in
technologies implemented.
9. Explain - Types of control
Ans.:
Based on objec ves of controls…
Types Preven ve Controls Detec ve Controls Correc ve Controls
Meaning Designed for / to
Prevent from
Occurring –
Any error /
omission &
malicious act
Designed for / to
Detect & Report –
Any error /
omission &
malicious act
Designed for / to Iden fy
& Reduce impact / Correct
–
Any error / omission &
malicious act
3 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
Characteris cs A. Clear-cut
understanding of
vulnerabili es of
the assets
B. Probability of
threats
C. Prior for controls
A. Iden fy in
progress
B. Understanding
of lawful ac vity
C. Report unlawful
D. Interac on with
preven ve &
correc ve
controls
E. Surprise check
A. Iden fy cause of
problem
B. Provide Remedy /
medicines
C. Reduce Impact
D.Correc ng Error
E. Modify system for future
F. Feedback from
Preven ve & Detec ve
Controls
Example A. Firewall
B. Password
C. An virus SW
D. Qualified Staff
E. Segrega on of
duty
F. Employee
training
A. Hash total
B. IDS
C. BRS
D. Variance
Analysis
E. Audit
F. Monitoring
A. BCP & DRP
B. Re-run procedure
C. Back-up procedure
Compensatory Controls
Meaning A. Designed to reduce probability of threats
B. Based on “Cost of lock of asset should not be more than value of
asset”
i.e. implement not appropriate control but compensatory measure
in this case, Due to difference constraints.
C. Not as effec ve / efficient as Appropriate control
Based on objec ves of Nature of IS Resources…
A. Environmental Controls
B. IS Opera onal Controls
C. IS Management Controls
D. SDLC Controls
E. Physical Access Controls
F. Logical Access Controls
Based on objec ves of Nature of func on…
A. Internal Accoun ng Controls
B. Opera onal Controls
C. Administra ve Controls
10.What are the major control techniques in organiza on?
Ans.:
A. Organiza onal Controls
B. Management Controls
C. Financial Controls
4 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
D. Data Processing Environment Controls
E. Physical Access Controls
F. Logical Access Controls
G. SDLC Controls
H. BCP Controls
I. Applica on Controls
11.Explain - Job Descrip ons
Ans.:
o It establish…
A. Instruc ons on “How to do the job?”
B. Policy define the authority of the employee.
o It communicate “Management’s specific expecta on from job performance”.
o All jobs must have a current documented job descrip on readily available to employee
o Establish responsibility & accountabili es.
12.What is ‘Segrega on of du es’?
Ans.:
A. Common control technique aimed at “Separa ng Conflic ng Job Du es”
(i.e. Distribu on of work responsibili es – Maker cannot be checker)
B. Main purpose – to prevent / detect errors / irregulari es, serves check on work done by
others, make collusion necessary to commit a fraud.
C. Organiza onal controls structures should be designed in a manner that ensure ‘Highest
level of separa on of du es’.
D. Factors to be considered –
I. Nature of business opera ons
II. Managerial policy
III. Organiza onal structure with job descrip on
IV. IS resources deployed
13.Explain - Management controls
Ans.: Management controls shall include…
A. Responsibility
B. An official IT Structure
C. An IT Steering Commi ee
14.Explain - Financial Controls
Ans.:
A. Authoriza on
B. Budgets
C. Documenta on
D. Cancella on of Documents
E. Input / Output varia on
F. Serially numbered Docs (Sequen ally)
G. Safekeeping
5 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
H. Supervisory Review
I. Segrega on of Du es
J. Dual Controls (2 people have Simultaneously access on an asset)
15.What is Audit Trails?
Ans.:
Audit trails are logs (i.e. chronological list of the ac vi es performed) that are designed to
record ac vity at the system, applica on & user level.
It is type of detec ve controls and generally, used in every organiza on.
16.Who are the members of Security Policy?
Ans.: Comprises of…
A. Managerial – Management member, who have budget & policy authority
B. Technological – Technical group, who know what can / cannot be supported
C. Legal – Legal Expert, who know the legal ramifica on of various policy changes
17.Explain - Types of Security Policy
I) User Security Policy (i.e. for secure use of the system by users)
Set Responsibili es & Requirements and provide reference to all users
A. User Security Policy
B. Acceptable Usage Policy - Set out the policy for acceptable use of email &
internet services
II) Organiza onal Security Policy (i.e. for security of organiza onal informa on systems,
network & informa on resources)
A. Organiza onal Informa on Security Policy
Group Policy for security of informa on assets & IT system processing informa on
and it is main IT security policy documents
B. Network & System Security Policy
Detailed policy for system & network security and apply to IT department users.
C. Informa on Classifica on Policy
Policy for classifica on of informa on
III) Condi ons of Connec on:
Group policy for connec ng their network
Applies to all organiza on connec ng to group & relates to condi ons that apply to
different systems of supplier.
18.What are the components of security policy?
Ans.:
A. Security policy infrastructure
B. Security organiza on Structure
C. Descrip on of technologies & compu ng structure
D. Inventory & classifica on of assets
E. Physical & Environmental security
F. Iden ty Management Access Control
G. SD & Maintenance Controls
6 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
H. IT Opera ons Management
I. IT Communica ons
J. BCP
K. Legal Compliances
L. Security policy document maintenance & compliance requirement
M. Purpose & scope of document & intended audience
N. Monitoring & Audi ng Requirement
O. Underlying Technical Policy
P. Incident Management – Response & Repor ng
19.What is IS Controls / Internal Controls?
Ans.:
Control = Policies, Procedures, Prac ces & enterprise structure that designed to provide
reasonable assurance that
A. The business objec ve will achieved
B. Undesired events are prevented / detected & corrected.
20.Explain - Impact of technology on internal controls
Ans.:
(RMC Access SAP)
A. Record keeping
B. Management Supervision & Review
C. Concentra on of programs & data (Centraliza on)
D. Access to Assets & Records (Physical & Logical Controls)
E. Segrega on of Du es
F. Authoriza on Procedure
G. Personnel (Competent & Trust worthy – Appropriate skills & training required and know
“What they are doing?”)
21.What are the Components of internal controls?
Ans.:
(As per COSO – Same concept in Audit) – CRC IM
A. Control Environment:
The control consciousness of organiza on i.e. atmosphere
B. Risk Assessment:
Iden fy & analyze risks faced by an org. to manage them.
C. Control Ac vi es:
Ac ons to manage & Reduce risk assessed
D. Monitoring:
Elements that ensure internal controls operate reliably over a me
E. Informa on & Communica on:
Informa on Iden fied, captured & exchanged in mely & appropriate form to discharge
responsibility.
7 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
22.Explain - Boundary Controls
Ans.:
A. Major Boundary Controls – ACM: Access Control Mechanism
Access control is implemented with ACM, link authen c user & access to authorized
resources they are permi ed.
ACM = IAA
No IAA What You Class of info. Example
1 Iden fica on Know? Personal Info. Name, DOB, PW, Pin
2 Authen ca on Are? Personal
Characteris cs
Voice, Signature, Fingerprint
3 Authoriza on Have? Personal
Objec ves
ID Card, Badge, Key, Smart Card
B. Boundary Control Technique:
I) Cryptography
It is a process of Transforming ‘data into codes / cypher text’ that are meaningless to
anyone, who does not possess the authen ca on to access the resource/file.
(i.e. encryp on & decryp on)
II) Password
III) Iden fica on
IV) Biometric Card
C. Input Controls
Ensuring accuracy & completeness of data & instruc on input entered into an
applica on system
Those controls are ‘Preven ve in nature’ and called ‘Front end applica on controls’.
D. Processing Controls
Perform valida on checks to iden fy errors during process and detec ve in nature
Ensure accuracy & completeness of data being processed.
Generally, this control enforced by DMBS.
E. Output Controls
Ensure data delivery to users will be preven ve, forma ed & delivered in consistent &
secured manner and ensure CIA of data.
F. Database Controls
Designed to protect integrity of DB, when applica on so ware acts as interface, to
interact, between user & DB.
I) Update Controls –
All record processed, sequence check, maintain suspense account and etc.
II) Report Controls –
Print run to run control totals, standing data (updated), Existence / recovery controls,
Print suspense account and etc.
8 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
23.Explain - Informa on Classifica on
Classifica on is based on sensi vity or confiden ality of informa on and not based on value
or cost of informa on.
No Class Meaning
Control /
Security Req.
Example
1 Top Secret
That can cause serious damage to
organiza on, if lost / made public
Highest Level
Formula
of Coca-Cola
2
Highly
Confiden al
Cri cal for ongoing business
opera on & can cause serious
impediment (Slow down) if share
around organiza on
Very high
Product related
decision etc.
3 Proprietary
Rela ng to procedures, opera onal,
rou ne works, project plans,
designs etc.
(only for authorized personal)
High Payroll Data
4
Internal Use
only
Cannot be circulated outside the
organiza on & if disclosed, will
created inconvenience to
organiza on but not result in
financial loss
Normal
Manager going
to re re in
future
5 Public Docs
Informa on published in public
domain i.e. (of public use etc.)
[Control - only for integrity is Req.]
Minimal /
No Control
B/S, P&L, FS
etc.
24.What are the data integrity controls?
Ans.:
They protect data from accidental / malicious – alterna on / destruc on & provide
assurance to user that informa on meets expecta ons about its quality & integrity.
Categories of integrity controls:
A. Source data controls
B. Input valida on rou nes
C. Online data entry controls
D. Data processing & data storage controls
E. Output controls
F. Data transmission controls
25.What are the data integrity policies?
Ans.:
A. Virus signature upda ng (Automa c)
B. So ware tes ng
C. Division of environment
D. Offsite backup storage (older than 1 month to permanent storage)
E. Quarter & year-end backup
F. DRP – Disaster Recovery Planning
9 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
26.Explain - Logical Access Control
Ans.:
LAC are implemented to ensure that only authorized users have access to system, data &
programs, So as to safeguard informa on from unauthorized disclosure, modifica on & use
i.e. maintain CIA.
Steps to be followed = ACM = IAA
27.What are the Logical Access paths in any system?
Ans.:
A. Online Terminals:
 For access has to provide valid login ID & PW
 Addi onal authen ca on mechanism is also required
 Operator Console:
 The crucial place where any intruder can play havoc, therefore, must be restricted.
 Keep it at loca on = visible to all + accessible by only authorized personnel
B. Dial-up Ports:
 User at one loca on can connect remotely to another computer present at unknown
loca on via telecommunica on media
 Modem act as interface between remote terminal & telephone line.
 Security is achieved by providing ID & PW for access.
C. Telecommunica on Network
 It is a number of computer terminals, PC etc. are linked to host computer through
network / telecommunica on lines.
 That can be private / public & security required = same as in online terminals.
28.Explain - Technical Exposure (need to remember all the points)
Ans.:
i.e. Unauthorized implementa on / modifica on of data & SW.
i) Data Diddling –
 Changing data before / as & when entered into the system
 Limited technical knowledge required
 Worst Part = Occurs before computer security can protect data
ii) Bombs –
 "A piece of bad code” deliberately planted / entered by insider / supplier of so ware.
 When gets triggered – causing the damage immediately but cannot infect other
programs.
A. Time Bomb: (Triggered by Time)
 Computer clock ini ates it.
 Time bomb causes perverse ac vi es. i.e. disrup on of computer system,
modifica on or destruc ons of stored informa on etc on par cular date & me.
B. Logical Bomb: (Triggered by Combina on of events)
 Ac vated - by combina on of events.
10 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
iii) Trojan Horse:
 Bomb but no need to be triggered = Trojan Horse
 Malicious programs hidden under any authorized program
 Or else “illicit coding in legi mate program”
 Hide in host program & do not damage host program
 Cannot copy themselves to other so ware or program but can be transferred to
other system only if unsuspec ng user copies the Trojan.
iv) Worms:
 Does not require host program like Trojan / Bomb
 Therefore, Worm program copies itself to another machine on network.
 Since, it is standalone program = detected easily.
 Sabotage (Deliberately Destroy) the system & they can also be used to perform some
useful task s (like, check connec vity of the network)
v) Rounding Down: (10032.05 = 10032)
 Small frac ons of denomina on & transfer to authorized account (rarely no ced)
vi) Salami Techniques: (10032.05 = 10030)
 Slicing of small amount of money (here, last few digits – Rounded off)
vii)Trap Doors (Back Door):
 They are exists “out of an authorized program” & allow inser on of specific logic,
such as program interrupts that permit a review of data.
 They also permit access to unauthorized logic in program.
29.What is Asynchronous A acks (AA)?
Ans.:
 Generally on telecommunica on lines, numerous transmissions must wait for clearance
of line before data being transmi ed.
 Data that are wai ng to be transmi ed are liable to unauthorized access called AA.
 AA is Hard to detect because very small.
Forms:
A. Data leakage
B. Wire Tapping
C. Piggybacking – (Unauthorized person behind authorized person in Org.)
D. DOS – Denial of Service A ack
30.Explain - Computer Crime Exposure
Ans.:
A. Financial loss
B. Legal repercussions
C. Loss of credibility (Consequence)
D. Blackmail / industrial espionage – Process to learn secret info. With illicit purpose
E. Disclosure of confiden al / sensi ve / embarrassing info.
F. Sabotage
G. Spoofing (Steal iden ty of other)
11 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
31.What are the Logical access controls across the system?
Ans.:
A. User Access Management –
 User Registra on,
 Privilege Management,
 User Password Management,
 Review of user access rights
B. User Responsibility –
 Password use,
 Una ended user equipment
C. Network Access Controls –
 Policy on use of network services,
 Enforced path,
 Segrega on of networks,
 Network connec on and rou ng control,
 Security of network services
D. OS Access Controls –
 Automated terminal iden fica on,
 Terminal log-on procedures,
 User iden fica on and authen ca on,
 Password management system,
 Use of system u li es,
 Duress alarm to safeguard users,
 Terminal me out,
 Limita on of connec on me
E. Applica on & Monitoring System Access Control –
 Informa on access restric on,
 Sensi ve system isola on,
 Event logging,
 Monitor system use,
 Clock synchroniza on
F. Mobile Compu ng
G.
32.Explain - Physical Access Controls
Ans.:
Control over tangible resources & intangible stored in tangible media.
Issues & exposures:
Results of accidental / inten onal viola on of access path…
A. Abuse of data processing resources
B. Blackmail
C. Embezzlement
12 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
D. Damage / the to equipment / document
E. Public disclosure of sensi ve informa on
F. Unauthorized entry
33.Explain concept of Access Control Mechanism (ACM).
Ans.:
Associates with iden fy & authorize the users, the resources they are allowable to access &
ac on privileges.
A. Iden fica on
Users have to iden fy themselves + intent request for usage of system resources
B. Authen ca on
User must authen cate & mechanism must authen cate itself
C. Authoriza on
Check user request resources are allowed to access, then provided access.
Two approaches:
I) Ticket Oriented Approach:
 Assigns a cket for each resource they are permi ed to access.
 Operates by row in matrix
 Holds ac on privileges + Resources
 Advantage = Run me efficiency, can be used for large number of users
efficiently.
II) A List Oriented Approach:
 Associates with each resource a list of users who can access the resources &
privileges.
 Allows efficient admin of capabili es
 Large number of users then = inefficient (i.e. for small no. of users)
34.What are the Physical Access Controls?
Ans.:
i. Locks on doors
A. Cypher lock
 Push bu on panel
 Computer coded with person’s handprint
B. Bol ng Door Locks – Open by only Metal key + Avoid to be duplicated
C. Electronic Door Locks
Gain:
i) Iden ty specie individual
ii) Restricted to specific area + specific hours
iii) Degree of duplica on
iv) Deac vate on termina on / stolen etc.
v) Accoun ng & Provide card = IMP part of admin.
D. Biometric Door Locks
13 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 3 : Protection of IS
ii. Physical Iden fica on Medium:
PIN, Plas c Card, Iden fica on Badges
iii.Logging on Facili es:
Manual Logging, Electronic Logging
iv.Other means of Controlling Physical Access –
Video Cameras, Security Guards, Controlled Visitor, Bonded Personnel, Dead Main Doors,
Non-Exposure of Sensi ve Facili es, Computer Single Entry Point, Alam System, Perimeter
Fencing, Control of out of hours of employee, Secured Report/Document Distribu on
Cart.
35.What is cyber fraud?
Ans.:
Fraud enabled by technology = cyber fraud
With the advancements in the technology, cyber frauds are also increasing day-by-day
across the world.
One of the major reasons behind the rise of such frauds are:
 Failure of internal control system,
 Failure of organiza ons to update themselves to new set of risk, and
 Smart fraudsters: These are people who are able to target the weaknesses in system,
lacunae’s in internal controls, even before the organiza on realizes that such gaps are
there.
36.What are the major techniques to commit cyber fraud?
Ans.:
A. Hacking – White hat hacker
B. Cracking – Black hat hacker
C. Phishing
D. Spoofing / Masquerading / impersona on
E. Data Digging
F. Data Leakage
G. DOS – Denial Of Service
H. Time / Logical Bombs
I. PassWord Cracking
J. Rounding Down
K. Slami Technique
L. Severing / Dumpster Diving / Data Dumping
M. Social Engineering Techniques
N. Super Zapping
O. Trap Door etc.
---- XXXX ---- XXXX ----
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
Chapter covers following topics…
A. DRP – Disaster Recovery Planning
B. CM / IM – Crisis Management / Incident Management
C. BCP – Business Con nuity Planning
D. BCM – Business Con nuity Management
1. What is DRP?
Ans.:
Disaster = Event which is very destruc ve
DRP = Technologies aspect of BCP
i.e. the advance planning & prepara on …
Necessary to minimize losses &
Ensure con nuity of cri cal business func on of organiza on
in the event of disaster.
2. What are the components of DRP (Plans of BCM / BCP / DRP)?
Ans.:
DRP = Combina on of 4 plans
Emergency Plan + Backup Plan + Recovery Plan + Test Plan
A. Emergency Plan:
Specify the ac ons to be undertaken immediately, when disaster occurs.
Management must iden fy those situa ons that require the plan to be invoked.
Covered four aspects…
i) Person to be called & no fied
ii) Ac ons to be taken
iii) Evalua on Procedure
iv) Return (to business Place) Procedure
B. Backup Plan:
i) Type of backup
ii) Frequency (i.e. period) of backup
iii) Procedure for backup
iv) Loca on of backup resources
v) Site – Where resource can be assembled & opera on can con nue
vi) Personnel – Responsible for gathering backup
vii) A me frame for recovery of each system
Types of backup:
i) Full Back up:
 Backup contains “Every file in backup set “.
 Large amount of me & space required + expensive than other
 Restora on of data is faster.
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
ii) Differen al Back up:
 Backup contains “That all files changed since LAST FULL Backup”.
 Faster & Economic than full backup and most efficient one.
iii) Incremental Back up:
Backup contains “That all files changed since LAST ANY TYPE of Backup”.
i.e. last full backup / differen al backup / incremental backup.
It is most economical but difficult to restore & take li le bit more me.
iv) Mirror Backup:
It is full back up as name suggest.
Except: Not compressed in Zip & Not password protected.
Alternate Processing Facili es Arrangement / Site:
i) Cold Site: (0%)
(When we can tolerate down me)
Need to install all facili es on the event of disaster.
No mainframe will be installed by organiza on.
ii) Worm Site: (50%)
Cold site + Hardware facili es installed
i.e. installed hardware that might be difficult to obtain / install (on disaster).
It is intermediate level of backup.
iii) Hot Site: (100%)
(When faster recovery is cri cal)
All hardware, So ware, Data & Supplies = Installed = Ready to use.
It is most expensive one.
Generally, it is shared with other organiza on.
iv) Reciprocal Agreement:
Two / more organiza on - Agree to provide back facili es to each other on the
event of disaster.
Cheap but both should have sufficient capacity for the same.
v) 3rd
Party Arrangement / Outsourced:
Must have contract for following…
A. How soon site will be available
B. No. of organiza ons – allowed concurrent use
C. Priority to be given
D. Time period – site can be used
E. Condi on for use of site
F. Facili es & Services – that will make available
G. Controls will be placed.
3 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
C. Restore Plan:
Setout – procedure to restore full is capabili es.
I) Iden fy recovery commi ee – responsible for recovery
II) Specifies the responsibili es of commi ee & guidance on priori es to be followed
III) Members of commi ee – understand their ‘Responsibili es’
IV) Might indicate – ‘Applica ons are to be recovered first’
D. Test Plan:
The plan = s ll unfamiliar, need to test!!!
Therefore, final step = Test the DRP.
Purpose of test –
i) To iden fy difficul es in all above 3 plans
ii) Readiness of organiza on & its personnel for facing disaster.
It must enable organiza on –
i) To simulate effect of disaster
ii) Specify criteria by which 3 plans results sa sfactory.
But Management may be unwilling for periodically test –
i) Daily opera on disrupted
ii) Test = may results Real Disaster
3. What is Crisis Management / Incidental Management Planning?
Ans.:
CM/IM means the overall co-ordina on of organiza on’s response to a crisis in effec ve &
mely manner with a view to avoiding / minimizing damage to organiza on’s profitability,
reputa on & ability to operate.
4. Explain - Risk Management (From Chapter – 1)
Ans.:
RM = Process of iden fying & assessing risk, taking steps to reduce risk to the acceptable
level & maintaining that level.
Process = Risk Assessment Procedure…
A. Iden fy informa on assets & category of informa on
B. Valua on of that assets
C. Iden fy vulnerability & threats
D. Risk Assessment = Probability of Occurrence + Poten al Loss
E. Strategies for Risk Management:
i. Turn back / ignore – When very low impact
ii. Tolerate / Accept – When minor, Periodical review required
iii. Terminate / Eliminate – by Replacement
iv. Transfer / Share – by Sharing with partner
v. Treat / Mi gate – Eliminate from the origin
4 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
5. What is Asset?
Ans.:
Asset = Something of value to organiza on.
Include any of the following…
i. Value to organiza on
ii. Not easily replaceable
iii. Organiza on’s corporate iden ty & without which organiza on may threatened
iv. Data classifica on of these asset – Top Secret OR Highly Confiden al OR Proprietary
6. What is Vulnerability?
Ans.:
Vulnerability = Inherent weakness in system safeguards that exposes the system to
threats.
Any one of the following condi on…
Allow a ackers
i. To execute commands as another user
ii. To access data that is contrary (Unauthorized)
iii. To pose as another en ty (Spoofing)
iv. To conduct DOS (Denial of Service – A ack)
7. What is Threat?
Ans.:
It is an event that exploits the vulnerability of asset to cause serious damage to asset.
i.e. Any en ty, circumstances / event through, unauthorized access, destruc on,
modifica on, DOS etc.
It has capability to a ack on a system with intent to harm.
Asset & threats are closely correlated without target asset threat cannot exist.
8. What is Likelihood / Pi of threat?
Ans.:
Likelihood of threat occurring is the “Es ma on of Probability (Pi) that the threat will
succed to achieve undesirable event
i.e. Pi of threat materialized.
9. What is Exposure (i.e. impact)?
Ans.:
Extent of loss the organiza on has to face when a risk / threat materialized
Not just immediate impact but a “Real Harm” long run, also.
10.What is a Risk?
Ans.:
Risk = The poten al harm caused if a par cular threat exploits the vulnerability to cause
damage to the asset
Risk Analysis = The process of iden fying security risks & determining their magnitude &
impact on organiza on.
Risk Assessment = Procedure as already done above
5 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
11.What is Countermeasure?
Ans.:
Ac on, procedure, technique / other measure that “Reduces the vulnerability of
component or system is countermeasure”.
12.What is Residual Risk?
Ans.:
Any risk s ll remaining a er the counter measure analyzed & implemented = Residual Risk
13.Explain - Sources of risk
Ans.:
Most important step of risk management to iden fy sources of risk
i.e. area from where risk can occur.
Common sources are… (NEP TC MIH)
A. Natural events
B. Economic events
C. Poli cal Circumstances
D. Technology & Technological issue
E. Commercial & legal Rela onship
F. Management ac vity & Control (Internal Factor)
G. Individual Ac vi es
H. Human Behavior
14.Explain – Business con nuity Planning (BCP)
Ans.:
 It is crea on & valida on of “A prac cal logis cal plan”
 For how an organiza on will…
A. Recover & restore par ally / completely
B. Interrupted cri cal func ons (CBF)
C. Within predetermined me a er disaster / extended disrup on.
 Plan = for running business under stressful & me compressed situa ons.
 Plan lays out steps to be ini ated on occurrence of disaster, comba ng (fight) it &
returning to normal opera ons.
15.Explain - Objec ves & Goals of BCP
Ans.:
A. Provide safety & well-being of people on premise on disaster
B. Cri cal business lines & func ons
C. Con nue Cri cal Business Opera ons
D. Reduce dura on of serious disrup on to opera on & resource
E. Reduce immediate damage & losses
F. Facilitate effec ve Co-Ordina on of recovery tasks
G. Reduce complexity of recovery efforts / tasks.
6 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
16.What are the goals of BCP?
Ans.:
A. Iden fy “Weakness” & implement “A disaster Preven on Program”
B. Reduce dura on of a serious disrup on to business opera ons
C. Facilitate effec ve Co-Ordina on of Recovery Tasks
D. Reduce Complexity of Recovery Tasks
17.Explain - Phases of BCP
Ans.:
A. Pre-planning Ac vi es (Understand – Exis ng & Projected System)
B. Vulnerabili es Assessment & General Defini on Requirement
C. BIA
D. Detailed Defini on of Requirement
E. Plan Development
F. Tes ng Program
G. Maintenance Program
H. Ini al plan tes ng & plan implementa on
18.Explain - Business Impact Analysis (BIA)
Ans.:
Essen ally, a means of systema cally assessing the poten al impact resul ng from various
incident / event / disaster…
A. Iden fy cri cal system, process & func ons
B. Assess economic impact of incident & disaster that result in denial of access to the
system, services & facili es.
C. Assess “Pain Threshold = Length of me Business unit can survive without system,
services & facili es”
D. Iden ty & understand – The degree of poten al loss
Steps:
i) Iden fy organiza onal risk
ii) Iden fy cri cal business func on
iii) Iden fy + Quan fy threats / risks to cri cal business func ons (CBF)
iv) Iden fy dependencies & interdependencies of CBF
v) Determine maximum allowable “Down Time” i.e. Pain Threahold
vi) Type & Quan ty of resources required for recovery tasks
vii) Determine impact
Ways to gathering informa on:
A. Examina on of Documents
B. Interviews
C. Examina on of Documents
D. Workshops
BIA Report should be presented to “Steering Commi ee”, specify CBF & Pain Threshold
7 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
19.What are the objec ves of Plan Development?
Ans.:
Objec ve
A. To determine the available op ons & formula on of appropriate alterna ve
opera ng strategies,
B. To provide mely recovery for all cri cal process & their dependencies.
i.e. two ered strategy
A. Business – Logis cs, Accoun ng & HRM etc
B. Technical – IT = PC, LAN, Network, DBMS etc.
20.Explain - Business Community Management (BCM)
Ans.:
BCM = Planning + Develop + Running + Maintaining + Monitoring
BCM – business owned & business driven process that establishes “A fit for purpose
strategic & opera onal framework”
A. Improves enterprise’s resilience against disrup on
B. Rehearsed method of restoring enterprise’s ability to supply its key products & services
to agreed level within an agreed me a er disaster.
C. Delivers proven capabili es to manage a business disrup on & protect reputa on &
brand.
21.What is BCM Policy?
Ans.:
It defines processes of se ng up ac vi es for establishing a BC capability & ongoing
Management & Maintenance of BC Capability.
Objec ve = A structure through which…
A. CBF – iden fied
B. Plan developed for con nuity of CBF
C. Manage IM & BCP
D. Subject – IM & BCP to ongoing tes ng, revision & updates as required.
E. Assign – Planning & Management responsibility to a number of relevant senior
management team.
22.Explain - Components of BCM Process
Ans.:
A. BCM Management Process
B. Informa on Collec on
C. Strategy Process
D. Development & Implementa on Process
E. Tes ng & Maintenance Process
F. Training Process
8 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
23.Explain - BCM Management Process
Ans.:
 Address “the objec ves” defined in “BC Policy” by providing organiza on structure with
responsibili es & authority for implementa on & maintenance (I&M) of BCM.
 Organiza on should nominate a person / team with appropriate seniority & authority to
be accountable
i.e. Clearly defines person responsible for I & M of BCM in organiza on.
 Top Management should appoint the manager (BCM) responsible for ongoing I & M of
BCM within their area of responsibility.
i.e. system manager responsible for their func onal area.
 Implementa on should include following ac vi es
A. Defining the scope & context
B. Defining the role & responsibility
C. Regular tes ng of program
D. Maintaining up to date & appropriate BCP
E. Reviewing, reworking & upda ng BCP, RA & BIAS
F. Convert policies & strategies into ac ons
G. Managing costs & benefits
H. Engaging & involving stakeholders
 BCM documents required to be maintain (for minimum One Year)
A. BC Policy
B. BIA Report
C. BCM System
D. RA Report etc… (Complete from SM/PM)
24.How to classify the cri cal ac vi es?
Ans.:
A. BIA – same as above
B. Classifica on of cri cal ac vity (CBF):
BIA will be used in categoriza on (DEV) of infrastructure & business func on by disaster
scenario (Trivial, Minor, Major & Catastrophic) for various disaster causes.
D – Desirable
E – Essen al
V – Vital
For following chart,
A. Axis – X: Business Categories
Based on Loss of Revenue, Loss of Reputa on, Loss of Produc vity and Reduc on in
sa sfac on
Determine – Grade i.e. 123 / DEV / LMH
B. Axis – Y = Pi of occurrence of disaster
C. Catastrophic, Major, Minor & Trivial = Disaster Scenario decided from graph
D. RA – same as above
9 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 4 : BCP & DRP
25.Explain - Documenta on required for BCM
Ans.:
All documents that form the BCM are subject to the document control and record control
processes.
The following documents (representa ve only) are classified as being part of the business
con nuity management system:
A. The business con nuity policy;
B. The business con nuity management system;
C. The business impact analysis report;
D. The risk assessment report;
E. The aims and objec ves of each func on;
F. The ac vi es undertaken by each func on;
G. The business con nuity strategies;
H. The overall and specific incident management plans;
I. The business con nuity plans;
J. Change control, preventa ve ac on, correc ve ac on, document control and record
control
K. processes;
L. Local Authority Risk Register;
M. Exercise schedule and results;
N. Incident log;
O. Training Program.
---- XXXX ---- XXXX ----
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
Chapter covers following topics…
A. Business Process Design
B. System Development Process
C. Reasons for failure to achieve SD Objec ve
D. System Development Team
E. Roles in SDLC
F. Approaches for SD (How to Develop?)
G. Methodology for SD
H. SDLC (Benchmark Steps, to develop any system)
1. Explain - Business Process Design OR Business Process Re-engineering (BPR)
Ans.:
 It involves improving the exis ng business system by restructuring the business tasks,
func ons & ac vi es etc.
 Example: Conversion from legacy IS to ERP, it will require restructuring of business tasks,
func on etc.
 3 Steps:
A. Understanding & Documen ng the exis ng system
B. Proposed business Processes documenta on
C. Implemen ng new business processes
2. What is the System Development Process?
Ans.:
 It is iden fica on of exis ng business situa on with an aim for improving those
situa ons & then pu ng up an IS in place for achieve that aim.
 Key important phases:
A. System Analysis – Requirement Analysis (Thoroughly) to improve exis ng system
Exis ng System
 Problem in Exis ng (Remove)
 Addi onal Proposed Requirements
Total Requirements Analyzed
B. System Design –
Based on requirement analyzed
Convert into the System Design i.e. Flow Chart, Data Flow Diagrams etc…
3. Reason for failure – to achieve System development objec ves
Ans.:
User Related Issues:
A. Shi ing / Changing user needs
B. Resistance to change
C. Lack of user par cipa on
D. Inadequate tes ng & user training
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
Developer Related Issues:
A. Difficult to define the exact requirements par cularly for unstructured / strategic
system.
B. New Technologies
C. Lack of senior management support & involvement
D. Lack of standard project management & system development methodologies
E. Over worked / Under trained development staff
4. System Development Team:
Ans.:
A. Steering Commi ee:
Usually consists of a group of key IS Plans & Applica on developments
It ensures that ongoing systems development ac vi es are consistently aimed at
sa sfying the informa on requirement of managers & users.
i.e. by Review of “Progress of Project”
B. IS Department:
Responsible to Develop system
C. Project Management:
Co-ordinate Development Ac vi es of system i.e. computer professional & Key users
D. System Analysts:
Assigned to determined user requirements, design the system and assist in development
& implementa on ac vi es.
5. Roles of SDLC
Ans.:
A. Steering Commi ee
B. Project Manager
C. Project leader
D. System Analyst / Business Analyst
E. Module leader / Team leader
F. Programmer / Coder / Developer
G. DBA – Database Administrator
H. Quality Assurance
I. Tester
J. Domain Specialist
K. IS Auditor:
Ensure that applica on development also focuses control perspec ve.
Need to involve in design phase & final tes ng phase to ensure existence & opera ons of
controls in new so ware.
3 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
6. System Development Approaches
Ans.:
A. Tradi onal / Waterfall Approach –
 Phases of SDLC – one by one
 Many refinements are provided
 Ini al model organized in liner order output of one phase become input of next
phase and assumes no defect is introduced during any phases of life cycle
 Refinements:
i. In actual SD, the defect / error, get introduced in any of the phase of LC.
It is preferable to detect & correct in the same phase
But it is not always possible i.e. provision of feedback path introduced.
ii. Two/more phases to be conducted, simultaneously.
i.e. not one by one but parallel
B. Prototype Model –
 Before development of actual so ware a working prototype of system should be
build, first.
 Toy implementa on of system, provides…
i. Limited func onal capabili es
ii. Low reliabili es
iii. Inefficient performance
But help to understand the exact requirement from system.
Generic Phases of Prototype Model:
i. Iden fy informa on system requirement
ii. Develop the ini al prototype
iii. Test & Revise
iv. Obtain user signoff of the Approved Prototype
4 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
C. Incremental Approach –
 Combine both Waterfall & Prototype model.
 So ware product is built incrementally through different itera ons.
 Does not a empt to start with full specifica on of requirements but develop by
itera on of review.
D. Spiral Model/ Evolu onary Model –
 Similar to incremental model
 But with more thrust on risk analysis & resolu on.
 It also combines waterfall & prototype models.
 Ac vi es represented as Spiral rather than sequence of the ac vi es.
 Each loop in spiral is phase in process & no fixed phases like other but selected based
on requirement.
 Risk is explicitly assessed in each spiral’s loops & risks are resolved throughout Spiral
process.
E. Agile Methodologies –
 System development is human ac vity, therefore, there will be varia on in inputs &
process.
 Therefore, SD should flexible enough & agile for required changes.
 Plan ac vi es as nature of project.
 Follow itera ve cycle, advocates to work user and management
 People oriented approach
 No one by one systema cal steps required.
 Rapid & Flexible – Response to change.
F. RAD – Rapid Applica on Development
 Designed to give – faster development & high quality result.
 Maximum advantage of already developed powerful so ware for development of
new so ware. (Copy old one & make required changes)
 i.e. use already developed “So ware code / Programs” maximum possible.
5 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
 Key feature:
i. Low cost
ii. Quick development
iii. Right quality
 Useful when less me available & otherwise ‘requirement of business get changed.’
 Components:
i. JAD – Joint Applica on Development
ii. Rapid Development Project
iii. Clean Rooms
iv. Time Boxing
v. Incremental Prototyping
vi. Tools, like – CASE, DBMS etc.
7. SDLC – System Development Life Cycle:
Ans.:
 SDLC is a popular system development framework, which sequence steps to system
designer & developers for efficient system development.
 It is document driven framework i.e. at every stage of SDLC documenta on is produced.
 A phase of SDLC is not completed un l appropriate documenta on &work product is
produced.
Known as ‘Deliverables’.
 Does produced by previous phase is important for next phase ac vity, based on it all
decision will be taken.
8. Advantages of SDLC
Ans.:
General
A. Be er planning & control by project managers
B. Compliance with prescribed standard & ensure be er quality
C. Documents of SDLC are important measure of communica on & control
D. The phases are milestones i.e. help project manager review & signoff.
Audit Perspec ve:
A. Clear cut understanding of all steps & phases
B. Can state in report about compliance by IS Management
C. If IS Auditor has technical knowledge & capability
D. Evalua on of methods & techniques used in SDLC
9. Risk & Shortcomings of SDLC
Ans.:
A. Time consuming
B. Rigidity of approach may delay / prolong dura on
C. Development team may find cumbersome
D. End product – may not be for long term
E. May not be suitable for small & medium sized projects
6 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
10.Explicit knowledge & Tacit Knowledge
Ans.:
Explicit knowledge
 It can be formalized easily & as a consequence is easily available the organiza on
 It is ar culated, represented by spoken words, wri en material & complied data.
 This type of knowledge is codified, easy to document, transfer & reproduce.
Example:
A. Online Tutorials
B. Policy & Procedural manuals
Tacit knowledge
 It resides in a few o en in just one person & has not been captured by organiza on
 It is unar culated & represented as intui on, perspec ve, beliefs & values that
individuals form based on their experiences.
 It is difficult to document & communicate the tacit knowledge.
Example:
Hand on skills, Special knowhow, Employee Experiences etc.
-----: Phases of System Development Life Cycle (SDLC) :------
P1.Preliminary Inves ga on
A. Problem Defini on
B. Conduct Inves ga on
i. Review internal documents
ii. Conduct interview
C. Iden fy – Viable Op ons
D. Feasibility Study – Need to conduct
i. Technical : Required HW & SW available in the market?
ii. Financial : Financially viable – Affordability of Org.
iii. Economical : Cost Benefit Analysis – Profit / Loss
iv. Opera onal : Opera onal in org. by users – employees, customers, supplies
v. Schedule/Time : Es mated me – Proposed me acceptable or not
vi. Resource : Preliminarily related to availability of HR
vii. Legal : Conflict between proposed system &
Org. legal obliga on / license etc.
viii. Behavior : Adverse effect on quality of work life?
E. Submit ‘Report’ to management with recommenda on
7 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
P2.System / Requirement Analysis
A. Informa on Collec on (Fact Finding Technique)
i. Collec on of Documents
ii. Interviews
iii. Ques onnaires
iv. Observa ons
B. Analysis of current system
i. History of organiza on
ii. Data file maintain
iii. Inputs
iv. Method / Procedures
v. Output
vi. Internal Controls
+ Documenta on for following Two:
i. Modeling of exis ng logical & physical system
ii. Undertake overall analysis of Current system
C. Analysis of Proposed system
Therefore, Problem in Current system + New Req. in Proposed System = Specifica ons
i.e. Specifica ons for Proposed System:
For input, method/procedure, database, output, workload & me efficiency.
D. Repor ng – SRS – System Requirement Specifica ons
a. Introduc on -
b. Informa on Descrip on (for input / output) – Informa on content requirement
c. Func onal Descrip on (Process / Database) – all func on parameters
d. Behavioral Descrip on (Controls) – Connec vity to External & Internal Org.
e. Valida on Descrip on (Controls) – Tests to be formed
f. Appendix – All tools of system development i.e. DFD, Flow chart etc.
---------- System Development Tools ----------
a. System flow & component
For flow:
i. Flow Chart –
Physical flow of System
ii. Data Flow Diagram –
Logical flow of data within organiza on
Four basic elements:
1. Data source & des na on, 2. Data Flows, 3. Processes 4. Data Stores
For component :
iii. Component Matrix
Matrix framework to document resources used, ac vi es performed &
informa on produced.
8 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
b. User interface
i. Layout forms & screens
They are used to construct the formats & contents of input / output media &
methods
ii. Dialog flow diagrams
They are used to depict flow of dialogue between computer & people, based
on response to menus & prompts.
c. Data A ributes & Rela onship
i. File Layout Forms
Document type, size & name of data element in system
ii. Data Dic onary
Descrip on of informa on of data in files of IS (i.e. data about data, metadata)
It contains –
a) Name of the company file store data
b) Codes of data item length / type / range
c) Source documents used to create data
d) Individual / program to permit access or not permi ed
e) Name of the computer host programs that modify the data items
iii. Gird charts
Iden fying use of each type of data element
iv. E-R Diagrams
To document number & type of rela onship among the en es in a system
d. Detailed system process
i. Decision Tree
Network / tabular form for decision
ii. Decision Table
To document complex condi onal logic involving among informa on
processing alterna ves in system
e. PDL (Program Design Language) / Pseudo code
 Use of English language with syntax of structure of programming language
 Benefit:
English = convenience of ‘Spoken English Languages’
Structured Programming = To obtain Precision as programming.
f. CASE Tools (Computer Aided So ware Engineering Tools)
 These tools are used for the automa on of anything that ‘Human to do’ to
develop the system / so ware.
9 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
Q - What are the characteris cs of Good system designs?
Ans.:
A. Capture all func onali es of the system – correctly
B. Easy to understand
C. Efficient design
D. Flexible design
E. Based on extensive analysis
F. Flow prescribed standards of design
G. Modular
H. Directly relevant to business ac vi es
P3.System Design
A. Architectural Design
B. Design of data / informa on flow
C. Database Design
i. Conceptual modeling: (Design)
DBA design the database by E-R diagram & other tools
It describes – applica on domain via. En ty, a ributes, sta c & dynamic constraints,
rela onship among them.
ii. Data modeling: (Readable by Program)
Design prepared as above need to translate into data model so that it can be
accessed & manipulated by high & low level PL.
iii. Storage structure design (modeling): (How to store?)
How linearize & par on the data structure as in data modeling to store on device.
iv. Physical layout design (modeling): (Where to store?)
How distributed the storage structure across specified storage device & loca ons
like, tack, cylinder& sector on disk.
D. Design of interface input & output
1. Format, 2. Content, 3. Form, 4. Timeliness, 5. Media, 6. Volume
E. Physical Design
F. Design of Acquisi on of Hardware / So ware
P4.System Acquisi on & So ware Development
A. Hardware Acquisi on
B. So ware Acquisi on
Benefit of Applica on packages
i. Rapid implementa on
ii. Low risk
iii. High Quality
iv. Low Cost
10 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
Limita on of Applica on packages:
i. Lack of flexibility
ii. Par ally useful applica on
iii. Low quality of documents
iv. Con nuity
C. Contract & SW license
D. Vendors’ proposal valida on
Points to be considered for the valida on of proposal…
i. Performance – CBA
ii. Maintainability / Adaptability of each proposal
iii. Compa bility with exis ng system
iv. Support services by vendors
E. Methods of valida on proposals
i. Checklist:
Most Common, Simple Method, List of required specifica on for HW/SW/ Support
ii. Point scoring:
Criteria with maximum points & allocate points based on performance
iii. Evalua ng public report:
Magazines & manuals for the same – Published Periodically
iv. Bench marking test:
Job mix of possible transac ons executed on acquiring system and then results will
be compared with benchmark.
F. So ware Development
Characteris cs of good Program code:
i. Reliabili es
ii. Readability
iii. Robustness – Strong enough (should not get hang out)
iv. Accuracy
v. Efficient
vi. Usability
Stages in so ware Development
i. Program Analysis
ii. Program Design
iii. Program Coding
iv. Debug the Program
v. Program Documenta on
vi. Program Maintenance
Programming Language (PL):
 Set of instruc on in programming language = Program code = source program
 It is converted in Object Program (executable binary program) by Compiler.
11 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
 Debugging of So ware
i. Complier
Syntax / logical errors if any – check by complier while conver ng program
ii. Structured Walk through
Some me, there will be wrong business logic with correct syntax, so that, we
need to check Object Program (Executable Program) as Structured walk through.
iii. Test
Finally, tes ng of whole so ware is done by test data to find ‘Run Time Errors’.
P5.Tes ng Phase
A. Unit Tes ng
i. Func onal Tes ng : Process/func on – correct supposed to be
ii. Performance Tes ng : Avg. response me
iii. Stress Tes ng : Maximum load a system can handle
(Users simultaneous access)
iv. Structural Tes ng : Internal logic of programs
v. Parallel Tes ng : same data for old & new – compare results from both
Types of Unit Tes ng –
Sta c (Non Execu on)
i. Desk Check: by Programmer himself
ii. Structured Walk Through: by other programmers through the text of program
iii. Code Inspec on: reviewed by a formal commi ee with formal checklists.
Dynamic (Execu on)
i. Black Box Tes ng:
External Perspec ve – no relevance with internal codes
Test designer selects valid & invalid inputs & determines the correct output
ii. White Box Tes ng:
Internal Perspec ve – need to test whole system & codes
Need to ensure internal opera on of the product conforms to specifica ons & all
internal components are adequately exercised.
iii. Gray Box Tes ng:
Combina on = Black + White (i.e. based on Modules)
B. Integra on Tes ng
i. Bo om Up Tes ng – Tradi onal strategy
ii. Top Down Tes ng
iii. Regression Tes ng (when new Module introduced)
C. System Tes ng
i. Recovery ii. Security iii. Stress iv. Performance
12 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
D. Final Acceptance
i. Quality Assurance Test
ii. User Acceptance Test
a. Alpha Test – α – By internal Staff
b. Beta Test – β – By External Expert
P6.System Implementa on
A. Equipment installa on
i. Site prepara on
ii. Install
iii. Check
B. Training
i. System Operators
ii. User training
C. Conversion
i. Procedure conversion
ii. File conversion
iii. System conversion
a. Direct conversion : Immediately change system from next day
b. Parallel conversion : Old system con nue un l new system work properly
c. Modular conversion : Start to change system module wise
d. Pilot conversion : Change system at one loca on, than at all.
iv. Scheduling conversion
v. Alterna ve conversion
P7. System Implementa on
A. PIR – Post Implementa on Review (PIR)
Did we get what we have set out to do in terms of business?
(If No, than now, what should we need to do?)
For That - DOI Evalua on Required…
i. Development Evalua on
ii. Opera on Evalua on
iii. Informa on Evalua on
B. Maintenance –
i. Schedule Maintenance:
An cipated & planned for opera onal con nuity & avoidance of an cipated risk
ii. Rescue Maintenance:
Previously non-detected malfunc ons that were not an cipated but require
immediate troubleshoo ng solu on
13 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC)
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 5 : SDLC
iii. Correc ve Maintenance:
Fixing bugs in code/defects found during the execu ons (ini ated by bug report &
drawn up by end user)
iv. Adop ve Maintenance:
Adap ng so ware to changes in environment, such as hardware/OS
v. Perfec ve Maintenance:
The system runs sa sfactorily, but for accommoda ng to new/changed user
requirement & ac vi es to increase performance.
vi. Preven ve Maintenance:
Ac vi es aimed at increasing system maintainability & improving modular
structure of system.
C. Opera onal Manual
It is typical user’s guide, also commonly known as Opera ons Manual.
The sec on of an opera on manual will include the following:
1) A cover page, a tle page and copyright page;
2) A preface, containing details of related documents and informa on on how to
navigate the user guide;
3) A contents page;
4) A guide on how to use at least the main func ons of the system;
5) A troubleshoo ng sec on detailing possible errors or problems that may occur, along
with how to fix them;
6) A FAQ (Frequently Asked Ques ons);
7) Where to find further help, and contact details;
8) A glossary and, for larger documents, an index.
D. Auditor’s Role in SDLC:
 The audit of systems under development can have three main objec ves.
 It is primarily aimed to provide an opinion on the efficiency, effec veness, and
economy of project management.
 An auditor’s role is to assess the extent to which the system being developed
provides for adequate audit trails and controls to ensure the integrity of data
processed and stored; and the effec veness of controls being enacted for the
management of the system's opera on.
 In order to achieve these goals, an auditor has to a end project and steering
commi ee mee ngs and examine project control documenta on and conduc ng
interviews.
---- XXXX ---- XXXX ----
1 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 6 – Audi ng of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 6 : Auditing of ISs
1. What are needs of audit of informa on system?
Ans.:
Due to absence of control, following results may be there…
A. Organiza onal costs of data loss
B. Cost of computer abuse
C. Incorrect Decision Making cost
D. Loss of value of Hardware, So ware & personnel
E. High cost of computer errors
F. Maintenance of privacy may compromise
G. Due to control – we can evaluate the use of computer
2. What are the Objec ves of IS Audit?
Ans.: (Sieeeeee)
(Safeguard, Integrity, Effec veness & Efficiency)
A. Improve data security & safeguard of the assets
B. Improve data integrity
C. System effec veness objec ves – Improve Performance
D. System efficiency objec ves – Reputa on & Customer Loyalty
3. Explain – Effects of computers on audit
Ans.:
For evidence collec on (for Audit Purpose)–
A. Absence of input documents
B. Lack of visible output
C. Lack of visible output trail
D. Data reten on & storage
E. Audit evidence – system generated
F. Legal issues
For evidence evalua on (for Audit Purpose)–
A. System generated transac on (due to backend processing)
B. System errors (Systema c Errors – Coding Errors)
4. Who is responsible for implemen ng the controls in organiza on?
Ans.:
Responsible = Management
A. Develop & implement ‘Cost Effec ve Internal Control (IC)’
B. Assess adequacy of IC in programs & opera ons
C. Separately assess adequacy of IC over IS in consistent with security policy
D. Iden fy the need & improvements
E. Take – corresponding correc ve ac ons
F. Report annually on IC through management assurance statement
2 | P a g e
VR Talsaniya; (+91) 8671866086 Chapter 6 – Audi ng of Informa on Systems
Contact : (+91) 8671866086
Email : ca.vrtalsaniya@gmail.com
Slide-share : VR Talsaniya
VR Talsaniya
(CA. Vijay R. Talsaniya) Fast Track Notes
Chapter – 6 : Auditing of ISs
5. What auditor needs to do?
Ans.:
Responsibility of auditor:
A. Validate the implemented IC
B. Also provide recommenda ons for improvements in IC (if any).
6. What are the ‘Set of skills’ expected from the IS Auditor?
Ans.:
A. Knowledge of business prac ces & compliance
B. Knowledge of IT policy or security policy
C. Knowledge of professional standards & best prac ces
D. Adequate – Professional Technical qualifica on
E. Ability to Understand – Technical controls
F. Understanding of IS Risks & Controls
7. What are the Categories of IS Audit / Types of IS Audit / Area required to be audited in the
IS Audit?
Ans.:
A. System (Opera on System) & Applica on
B. Informa on processing facili es
C. System Development (SD)
D. Management of IT & enterprise architecture
E. Telecommunica on, intranets & extranets.
8. What are the steps of IT Audit?
Ans.:
A. Scoping & Pre-audit survey - Scope
B. Planning & Prepara on - Plan
C. Audit & Field Work - Fieldwork
D. Analysis - Analysis
E. Audit Repor ng - Report
F. Closure Notes – Closure
9. Factors / cri cal factors should be considered in preliminary review by IS Auditor
Ans.:
A. Knowledge of the business
B. Understanding of the technology
C. Understanding of IC System
D. Legal considera on & audit standards
E. Risk Assessment (RA) & Materiality
(i.e. Inherent Risk, control Risk, Detec on Risk & Material or not?)
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL

Mais conteúdo relacionado

Mais procurados

Tailor an IT Governance Plan to Fit Organizational Needs
Tailor an IT Governance Plan to Fit Organizational NeedsTailor an IT Governance Plan to Fit Organizational Needs
Tailor an IT Governance Plan to Fit Organizational NeedsInfo-Tech Research Group
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.keyBasta Group BV
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3pjmartinez
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Osman Hasan
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookHazel Jennings
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance IntroductionKeith Rackley
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Redspin, Inc.
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisPECB
 
Records_Management_Best_Practices_Guide
Records_Management_Best_Practices_GuideRecords_Management_Best_Practices_Guide
Records_Management_Best_Practices_GuideBill DeFeo
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing worldPECB
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 

Mais procurados (19)

What is IT Governance?
What is IT Governance?What is IT Governance?
What is IT Governance?
 
Tailor an IT Governance Plan to Fit Organizational Needs
Tailor an IT Governance Plan to Fit Organizational NeedsTailor an IT Governance Plan to Fit Organizational Needs
Tailor an IT Governance Plan to Fit Organizational Needs
 
it grc
it grc it grc
it grc
 
Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbook
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance Introduction
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
 
Records_Management_Best_Practices_Guide
Records_Management_Best_Practices_GuideRecords_Management_Best_Practices_Guide
Records_Management_Best_Practices_Guide
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
314
314314
314
 

Semelhante a Information System Control & Audit (ISCA) - CA FINAL

IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014ArmeniaFED
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27Espo2460
 
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Alejandro Rivera Santander
 
It governance 13 may20102
It governance 13 may20102It governance 13 may20102
It governance 13 may20102James Sutter
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c Security B-Sides
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
Mergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT IssuesMergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT Issuescurtherge
 
IT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersIT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersWalter Adamson
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangThang Ta Hoang
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylanozewai
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_itKamalakar Yadav
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxanthonywanjohi5
 

Semelhante a Information System Control & Audit (ISCA) - CA FINAL (20)

IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Business-IT Alignment
Business-IT AlignmentBusiness-IT Alignment
Business-IT Alignment
 
336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27336 Yes Getting Everyone To Agree Final Updated Aug 27
336 Yes Getting Everyone To Agree Final Updated Aug 27
 
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
Information technology controls- David A. Richards, Alan S. Oliphant, Charles...
 
It governance 13 may20102
It governance 13 may20102It governance 13 may20102
It governance 13 may20102
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Mergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT IssuesMergers & Acquisitions - Addressing The Critical IT Issues
Mergers & Acquisitions - Addressing The Critical IT Issues
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
It governance
It governanceIt governance
It governance
 
IT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business ManagersIT Governance - Core Concepts for Business Managers
IT Governance - Core Concepts for Business Managers
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_Thang
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylan
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_it
 
Managing Information Technology
Managing Information TechnologyManaging Information Technology
Managing Information Technology
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 

Mais de VR Talsaniya

GST in India: E - Way Bill
GST in India: E - Way BillGST in India: E - Way Bill
GST in India: E - Way BillVR Talsaniya
 
Basic Concepts of Cost Accounting
Basic Concepts of Cost AccountingBasic Concepts of Cost Accounting
Basic Concepts of Cost AccountingVR Talsaniya
 
Cost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingCost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingVR Talsaniya
 
Chapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareChapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareVR Talsaniya
 
Chapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsChapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsVR Talsaniya
 
Chapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksChapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksVR Talsaniya
 
Chapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsChapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsVR Talsaniya
 
Chapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyChapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyVR Talsaniya
 
Technology in CA Education
Technology in CA EducationTechnology in CA Education
Technology in CA EducationVR Talsaniya
 
International Taxation
International TaxationInternational Taxation
International TaxationVR Talsaniya
 
Independent Director
Independent Director Independent Director
Independent Director VR Talsaniya
 
International Taxation - Transfer Pricing
International Taxation - Transfer PricingInternational Taxation - Transfer Pricing
International Taxation - Transfer PricingVR Talsaniya
 
Corporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaCorporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaVR Talsaniya
 
MS Office - MS Outlook & Calendar
MS Office -  MS Outlook & CalendarMS Office -  MS Outlook & Calendar
MS Office - MS Outlook & CalendarVR Talsaniya
 
Service Tax on Works Contract
Service Tax on Works ContractService Tax on Works Contract
Service Tax on Works ContractVR Talsaniya
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsVR Talsaniya
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of ControlsVR Talsaniya
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
Types of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressTypes of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressVR Talsaniya
 
Wealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsWealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsVR Talsaniya
 

Mais de VR Talsaniya (20)

GST in India: E - Way Bill
GST in India: E - Way BillGST in India: E - Way Bill
GST in India: E - Way Bill
 
Basic Concepts of Cost Accounting
Basic Concepts of Cost AccountingBasic Concepts of Cost Accounting
Basic Concepts of Cost Accounting
 
Cost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingCost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral Accounting
 
Chapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareChapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through Software
 
Chapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsChapter - 4 : Business Information Systems
Chapter - 4 : Business Information Systems
 
Chapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksChapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & Networks
 
Chapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsChapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology Fundamentals
 
Chapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyChapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information Technology
 
Technology in CA Education
Technology in CA EducationTechnology in CA Education
Technology in CA Education
 
International Taxation
International TaxationInternational Taxation
International Taxation
 
Independent Director
Independent Director Independent Director
Independent Director
 
International Taxation - Transfer Pricing
International Taxation - Transfer PricingInternational Taxation - Transfer Pricing
International Taxation - Transfer Pricing
 
Corporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaCorporate and Commercial Laws in India
Corporate and Commercial Laws in India
 
MS Office - MS Outlook & Calendar
MS Office -  MS Outlook & CalendarMS Office -  MS Outlook & Calendar
MS Office - MS Outlook & Calendar
 
Service Tax on Works Contract
Service Tax on Works ContractService Tax on Works Contract
Service Tax on Works Contract
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing Models
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of Controls
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Types of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressTypes of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP Address
 
Wealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsWealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of Sections
 

Último

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Information System Control & Audit (ISCA) - CA FINAL

  • 1. CA Final : Group – II Paper – 6 – ISCA Information System Control & Audit Fast Track Notes CA - final INFORMATION TECHNOLOGY - INEVITABLE PART OF LIFE Contact : (+91) 8671866086 Email : ca.vrtalsaniya.com Slide-share : VR Talsaniya Linkedin : Vijay Talsaniya Facebook : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) We Need to Control Technology, Otherwise, Technology will Control us. For - May 2017
  • 2. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs Objec ves of ISCA: 1) Iden fy & review IT Risks & controls 2) Assess Impact on organiza onal structure of technology integra on 3) Understand & apply IT Best prac ces 4) Assess Informa on system acquisi on, development and implementa on strategy 5) Assess BCP of organiza on from Going concern perspec ve 6) Understand key Concepts of Governance, Risk and Compliance (GRC) 7) Understand how to perform Audit - collec on and evalua on of evidence in IT environment 1. Explain - Key concepts of Governance Ans.: Various defini ons related to governance: A. Governance : Stakeholders evaluate op ons set direc ons monitor compliance to meet objec ves B. Enterprise Governance : Set of responsibili es exercised by board or execu ve management For… a. Providing strategic direc on b. Ensuring objec ve achieved c. Risk managed property d. Organiza on’s resources are used responsibly C. Corporate Governance : A system by which a company / enterprise is directed & controlled to achieve the objec ve of increasing shareholder value by enhancing economic performance. D. IT Governance: A system by which IT ac vi es in a company on enterprise are directed & controlled to achieve business objec ves with the ul mate objec ve of mee ng stakeholder needs. 2. What is the Rela onship between Corporate governance and IT governance? Ans.: A. Strategic alignment of IT & business objec ves is cri cal success factor B. IT provide inputs and informa on to meet enterprise objec ve C. Objec ves of IT governance is similar to Corporate governance but with focus on IT D. Inseparable rela onship between both 3. What are the Benefits of Governance? Ans.: A. Rela onship improvement among customers, business and internal rela onship B. Aligned decision making for IT principles C. Achieving objec ve of enterprise by ensuring each element assigned with decision rights and accountability D. Encouraging Desired behavior in the use of IT E. Integra ng desired business processes into enterprise F. Overcoming limita ons of the organiza onal structure
  • 3. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 4. What are the Benefits of IT Governance? Ans.: A. Increased value delivered through enterprise IT B. Increased user sa sfac on with IT services C. Increased agility in suppor ng business needs D. Increased management & mi ga on of IT related business risk E. Increased transparency & understanding of IT’s contribu on to the business F. Be er cost performance of IT G. IT becoming an enabler for change H. Improved compliance with law, regula ons & policies I. More op mal u liza on of IT resources 5. Explain - Governance Dimensions Ans.: A. Conformance Dimensions : (Corporate Governance Dimension) 1) Focus on regulatory requirements - Historic 2) Covers areas of Role and composi on of Board, Board commi ees 3) Regulatory requirements and standards are addressed in this dimension. Example Sarbanes Oxley Act of US and Clause 49 lis ng requirement of SEBI B. Performance Dimensions : (Business Governance Dimension) 1) Focus on strategy and value crea on – Forward Looking 2) Helping the board to make strategic decisions, understand risk appe te 3) This dimension not governed by any standard C. Comparisons : 1) Conformance dimension monitored by audit commi ee 2) No such dedicated mechanism for Performance dimension. It is the responsibility of full board 6. What are the Key Func ons of IT Steering commi ees? Ans.: A. Long & short range IT plans in tune with enterprise objec ve B. Measuring results of IT projects in terms of ROI C. Size and scope of IT func ons D. Approve Deployment of major IT projects E. Viable communica on system between IT and its users F. Approve Standard policy & procedures G. Review the status of IS Budget and IT performance H. Facilitates Implementa on of IT security within enterprise I. Report to the board of directors on IT ac vi es J. Decisions on key aspects of IT deployment
  • 4. 3 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 7. What are the Benefits of GEIT (Governance of Enterprise IT)? Ans.: A. IT Processes are effec ve and transparent B. Confirm Compliance with legal and regulatory requirements C. Consistent Approach aligns with enterprise governance approach D. Governance Requirement for board member are met E. IT related Decisions are in line with enterprise objec ves 8. What are the Key prac ces for status of IT Governance determina on? Ans.: A. Who makes IT Management related decisions? (Direc ng, Controlling etc.) B. What informa on is required to make decision? C. What approach is used for DM? OR How the decisions are made? D. What DM mechanisms are required? E. How the excep ons are handled? F. How the IT governance results are monitored & improved? 9. Explain - Key prac ces of GEIT? Ans.: (EDM) A. Evaluate governance system B. Direct governance system C. Monitor governance system 10.What are the Key prac ces to evaluate business value from IT? Ans.: (EDM) A. Evaluate value op miza on B. Direct value op miza on C. Monitor value op miza on 11.Which Key Metrics can be used for evalua ng benefits realized from IT enabled investments? Ans.: Key metrics for value op miza on monitor: Business value is achieved by the benefit (in the form of ‘Op mal value’) to the business from the business processes and IT enabled investments at acceptable cost. Metrics: A. % of IT enabled Investments – where benefits monitored B. % of IT Services – where benefits realized C. % of IT enabled Investments – where benefits met /exceeded D. % of IT enabled Investments – where IT cost & benefits defined E. Sa sfac on survey of key stakeholders F. % of IT services – where Opera onal cost & benefits defined
  • 5. 4 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 12.Explain - Key Governance prac ces - Risk Management? Ans.: (EDM) A. Evaluate – Risk Management B. Direct – Risk Management C. Monitor – Risk Management 13.What are the Best prac ces of corporate governance? Ans.: A. Assignment of responsibili es and decision making from individual to board of directors B. Mechanism for interac on among board of directors and senior management C. Implemen ng strong Internal control and risk management func ons D. Monitoring of Risk exposure in areas of conflict of interest E. Incen ves to senior management and employees in form of compensa on, promo on F. Informa on flow internally and to the public in appropriate manner 14.Explain - Enterprise Risk Management (ERM) Ans.: Defini on of ERM: “Enterprise Risk Management is process affected by en ty’s Board of directors and applied across the enterprise to iden fy poten al events that may affect the en ty and to manage risk within risk appe te and provide assurance of achieving en ty objec ve. 15.What are the Components of internal controls as COSO? Ans.: (As per COSO – Same concept in Audit) – CRC IM A. Control Environment: The control consciousness of organiza on i.e. atmosphere B. Risk Assessment: Iden fy & analyze risks faced by an org. to manage them. C. Control Ac vi es: Ac ons to manage & Reduce risk assessed D. Monitoring: Elements that ensure internal controls operate reliably over a me E. Informa on & Communica on: Informa on Iden fied, captured & exchanged in mely & appropriate form to discharge responsibility. 16.What are the Categories of Strategic Planning: Ans.: (I – ERA) A. IS Strategic plan B. Enterprise Strategic plan C. IS Requirements plan D. IS Applica ons & facili es plan
  • 6. 5 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 17.Which are the Enablers of IS Strategic Plan? Ans.: A. Business strategy of enterprise B. How IT support business objec ve C. Assessment of exis ng system D. Inventory of technological solu ons & current infrastructure E. Enterprise Posi on on Risk F. Need for senior management support, cri cal review 18.Which are the Enablers of IS Requirement Plan? Ans.: A. Data Syntax rules B. Automated data repository and dic onary C. Informa on Model represen ng business D. Data Ownership and security classifica on E. Informa on Architectural Standard 19.Explain - Key management prac ces for aligning IT strategy with Enterprise strategy? Ans.: A. Understand enterprise Direc on B. Assess the Current Environment, capabili es and performance C. Define the Target IT capabili es D. Conduct Gap analysis E. Define the Road map and strategic plan F. Communicate IT strategy and direc on 20.Explain - Risk Management: (also covered in chapter – 4) Ans.:  IS Risks can be in the form inadequate disclosure, increasing electronic frauds etc.  IT based Informa on system is subject to Inherent risks.  Inherent risks are risks which cannot be eliminated but can be mi gated by appropriate security  Risk management is ‘Assessing risks’ and ‘Reducing to an acceptable level’ through appropriate security/ controls.  Controls are classified as Preven ve, Detec ve and Correc ve appropriate security/ controls assures that – A. CIA (Confiden ality, Integrity and Availability ) of data is maintained B. Access to data is restricted to authorized users only C. Computer facili es are available at all mes
  • 7. 6 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 21.What are the Sources of Risks? Ans.: Common sources are… (NEP TC MIH) A. Natural events B. Economic events C. Poli cal Circumstances D. Technology & Technological issue E. Commercial & legal Rela onship F. Management ac vity & Control (Internal Factor) G. Individual Ac vi es H. Human Behavior 22.Explain - Reasons for Gap between Need to protect system and protec on applied? Ans.: 1) External dangers from Hackers 2) Inter connec vity of systems 3) Devolu on of management & control 4) Elimina on of Time, Distance, Space constraints 5) Widespread Use of technology 6) Unevenness of technological Changes 7) Growing poten als fir Misuse 23.Explain - Risk Management Strategies Ans.: A. Turn back / ignore – When very low impact B. Tolerate / Accept – When minor, Periodical review required C. Terminate / Eliminate – by Replacement D. Transfer / Share – by Sharing with partner E. Treat / Mi gate – Eliminate from the origin 24.Explain - Key Management prac ces - Risk Management: (Check Q-12: if Key Governance Prac ces, than, Ans. = EDM) Ans.: A. Collect Data B. Analyze Risk C. Maintain Profile of Risk D. Ar culate Risk E. Define Ac on Por olio of Risk management F. Respond to Risk
  • 8. 7 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 25.Explain - Key Metrics of Risk Management (RM) Ans.: A. % of Cri cal business process covered by risk assessment B. Numbers of IT related Incidents not iden fied in risk assessment C. % of Enterprise risk assessments D. Frequency of Upda ng risk profile 26.What are the Key Management prac ces of IT Compliance? Ans.: ( I O C O ) A. Iden fy External compliance Requirement B. Op mize response to External Requirement C. Confirm External Compliance D. Obtain assurance of External Compliance 27.Explain - Key Metrics for assessing compliance with External laws? Ans.: A. Cost of IT non-compliance (se lement fines) B. Repor ng to the board of IT non-compliance C. Non-compliance related to Agreement with IT service providers D. Coverage of compliance assessment 28.Explain - Key Metrics for compliance with Internal Policies? Ans.: 1) Incidents related to non-compliance to policy 2) % of stake holders who Understand policies 3) % of policies supported by effec ve Standards 4) Frequency of policies review 29.What are the needs for use of COBIT 5 by enterprises? Ans.: GEIT Framework - COBIT 5 (Control OBjec ve for Informa on & related Technology) Need for use of COBIT 5 by enterprises: A. Development of Business focused IT solu ons B. Reduce IT related risks C. Enterprise wide involvement in IT related ac vi es D. Value crea on from use of IT E. Compliance with Laws & regula ons 30.Explain - 5 Principles of COBIT 5: Ans.: A. Mee ng Stakeholders needs B. Covering Enterprise End –to-End C. Applying a Single Integrated framework D. Enabling a Holis c approach E. Separa ng Governance from Management
  • 9. 8 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 31.Explain - 7 Enablers of COBIT 5: Ans.: A. Principles, Policies and Framework - translates desired behavior into prac cal guidance for day-to-day management B. Processes - describes organized set of prac ces to achieve certain objec ves C. Organiza onal structure - are key decision making en es in enterprise D. Culture, Ethics and Behavior - of the individuals o en underes mated as a success factor E. Informa on - is pervasive throughout the organiza on F. Services, Infrastructure and Applica ons - provides enterprise with informa on technology processing and services G. People, Skills and Competencies - are linked to people and are required for successful comple on of all ac vi es and taking correc ve decisions 32.What are the Components of COBIT 5? Ans.: A. Framework - Organize It governance objec ves, good prac ces and links them to business requirement B. Process Descrip on – ‘Reference process model’ and ‘Common language’ for everyone in organiza on C. Control Objec ves – Provide set of high level requirements for effec ve control of each IT process D. Management guidelines - Helps assign responsibili es, agree on objec ves and measure performance E. Maturity Models - Assesses maturity and capability per process and helps to address gaps 33.Explain - Benefits of COBIT 5 Ans.: A. Enables It to be governed in Holis c manner for en re organiza on taking full end-to- end business B. Comprehensive Framework enables enterprise in achieving objec ves C. Enables increased Business user sa sfac on and clear policy development D. Enables enterprise to create Op mal value from IT by maintaining balance between realizing benefits and op mizing risks levels E. Enables enterprise to Manage IT related risks and ensure compliance F. Generic Framework hence useful for enterprises of all sizes, whether Commercial, Non- profit or Public sector
  • 10. 9 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 1 – Concepts of Governance & Management of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 1 : Governance & Management of ISs 34.Goals used to measure successful Implementa on of GRC: Ans.: A. Redundant (extra) controls - Reduc on B. Control failures in key areas - Reduc on C. Expenditure related to Legal, Regulatory areas - Reduc on D. Overall me for audit of key business areas - Reduc on E. Streamlining of processes and me reduc on through automa on F. Repor ng of compliance issues and remedia on in mely manner G. Compliance status and key issues to senior management on real me basis 35.Several Key components evaluated by Internal auditor for Effec ve IT governance: Ans.: (L O PR PC) 1) Leadership - 2) Organiza onal structure – 3) Processes – 4) Risks - 5) Performance Measurement - 6) Controls – ---- XXXX ---- XXXX ----
  • 11. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 1. What is informa on? Ans.: In simple term, Processed data = Informa on Informa on is the data that has been processed into the form that is meaningful to recipient and is of real & perceived value in current and progressive decision. 2. Explain - A ributes of Informa on Ans.: (A PM VRT C Frequently Quality of CRV) A. Availability B. Purpose / Objec ve C. Mode & Format D. Validity E. Reliability F. Transparency G. Current / Updated H. Frequency I. Qualita ve (Presenta on, Timeliness, Place & Possession – U lity) J. Completeness & Adequacy K. Rate of Transmission L. Value of Informa on (CBA – Cost Benefit Analysis) 3. Explain - Role of Informa on in Business Ans.: Factors decide Informa on requirements A. Opera on Func ons Produc on, Finance& Marke ng B. Types of DM Structured, Unstructured and Semi-Structured C. Level of Business: (As follow) No Level Info. Required Role of Info. Types of DM Exp. of IS 1 Top Strategic Info. Essen al for long term planning (Major Policy Decision) Exp. For Launching new product, 1. Customer buying habit , 2. Combina on / Type 3. Loca on / Area 4. Price, Profit etc. For Unstructured DM EIS, DSS 2 Middle Tac cal Info. 1. Help in Smoothen implementa on of decision taken by Top Mgt 2. Short term planning For Semi Structured DM MIS
  • 12. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 3 Bo om Opera onal Info. 1. For smooth running of day to day ac vity 2. Improve opera onal efficiency & effec veness For structured DM TPS, PCS, ECS 4. What are the dimension / Value of Informa on? Ans.: (EBT) A. Economic – Cost Benefit Analysis (Benefit of from Info. – Cost of deriving Info. = Net Benefit) B. Business – Different types of info. Used at difference level of management (as above) C. Technical – Concern for security of info, rela ng to DBMS, Storage, Process & Retrieval etc. 5. Explain - Types of Informa on Ans.: A. External / Environmental Info. – Derived from outside the organiza onal boundary. Primarily from… (MET-G) I. Major factors of Produc on II. Economic trends III. Technological Environment IV. Government Policies B. Internal Info. – Derived from internal func ons of the organiza on (Main source is TPS) 6. Explain - System Ans.: A system is a group of interrelated and interdepended components, working together, to achieve common goal of the system, by accep ng inputs, processing it & providing desired outputs. 7. What are the Types of System? Ans.: There 8 types Based on 4 bases
  • 13. 3 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 8. What are the types of system based on output from system? Ans.: Determinis c System:  A determinis c system operates in a predictable manner wherein the interac on among the parts is known with certainty.  If one has a descrip on of the state of the system at a given point in me plus a descrip on of its opera on, the next state of the system may be given exactly, without error.  Example:- A computer program, which performs exactly according to a set of instruc ons. Probabilis c System:  The probabilis c system can be described in terms of probable behavior, but a certain degree of error is always a ached to the predic on of what the system will do.  Example:- A set of instruc ons given to a human who, for a variety of reasons, may not follow the instruc ons exactly as given. 9. Sub-system & Supra System Ans.: Sub-system: A system is divided into smaller system (Decomposi on Concept) Supra System: A system immediately above a sub-system (Integra on Concept) 10.Informa on System / Computer Based Informa on System (CBIS) Ans.: IS is a combina on of people, HW, SW, Communica on Devices, Data Sources , Network etc that processes data& informa on for specific purpose. Components of CBIS A. Peoples – IT Professional, Programmers, System Administra on & Users B. Computer System – HW & SW C. Data D. Network 11.Characteris cs of CBIS Ans.: A. Includes no. of sub-system & cannot work in isola on B. One sub system fails = whole system may fails C. Sub system with other = interac on, for common goal D. All system has common goal, even system designed and developed accordingly E. Works in integra on & common goal is more important than individual goal 12.Major area of computer based applica ons Ans.: A. Finance & Accoun ng B. Marke ng & Sales C. HRM
  • 14. 4 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts D. Inventory / Stores Management E. Produc on / Manufacturing 13.Applica ons of IS in business OR Vital roles in business firm Ans.: i.e. to support.. A. An organiza on’s Business Processes & Opera ons B. Business DM C. Strategic Compe ve Advantages 14.To manage IS effec vely & efficiently, Manager should have knowledge of following Ans.: Managers are not required complete understanding of complex, technologies, concepts & specific applica on but know knowledge… A. Fundamental Concepts B. Informa on Technology (Opera on & Development of HW/SW/data etc.) C. Business applica on of IT D. Development Processes (Business IT solu ons to the problems) E. Management challenges 15.Difference of IS & IT Ans.: IT is sub system / component of IS, i.e. To produce, store, communicate & manage the informa on by using computer / CPU. 16.TPS – Transac on Processing System Ans.:  At the lowest level of management  Manipulates data from business transac ons  Ac vi es:  Capturing, Processing, Generate Report & Processing of Queries TPS – Component 1. Input, 2. Processing, 3. Storage 4. Output 17.Features of TPS (SAB-L) Ans.: A. Source of input from other system B. Automa on of basic opera on C. Benefits are easily measurable D. Large volume of data 18.PCS – Process Control System Ans.:  Computer is used to control on going physical process  Automa c decision for control (may be by AI)
  • 15. 5 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 19.ECS – Enterprise Collabora on System Ans.: This system uses a variety of technologies to help people work together. It supports - Communica on of ideas, share resources, Co-ordinate co-opera ve work efforts. 20.MIS – Management Informa on System Ans.: An integrated user-machine system designed for providing informa on to support Opera onal Control, Management Control & Decision Making (DM) func ons in an organiza on. 21.Characteris cs of effec ve MIS Ans.: A. Management Oriented B. Management Directed C. Computerized D. Common Data Flow E. Common Database F. Sub-system concepts G. Integrated H. Long term / Heavy planning element I. Need based system J. Excep on based (flexible for excep on) 22.What are the misconcep ons about MIS? Ans.: A. CBIS = MIS B. Benefits of technologies C. Study of MIS = use of computers D. Any Repor ng system = MIS E. Accuracy in Repor ng = Prime Importance of MIS F. More Data = More Informa on G. MIS = Management Technique H. Implementa on of organiza onal system & procedures I. It is file structure 23.Prerequisites of effec ve MIS Ans.: A. Database B. Qualified ‘System & Management Staff’ C. Support from Top-M (Top Management) D. Control & Maintenance of MIS
  • 16. 6 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 24.Evalua on of MIS (Points to be considered while evalua ng MIS) Ans.: A. Examine flexibility to cope with expected / unexpected future change B. View about – Capabili es & Deficiencies C. Guiding – Appropriate authority about steps to be taken for maintenance of effec ve MIS 25.Constrains in the way opera ng MIS Ans.: A. Non availability of Experts B. Co-opera on from staff C. Varied objec ve = not standard objec ve D. Experts usually face the problem of selec ng subsystem 26. Limita on of MIS Ans.: A. Quality of output is governed by quality of input. B. MIS may not have requisite flexibility. C. Less useful for unstructured / semi structured problem (non-programmed decisions) D. MIS cannot provide tailor-made informa on packages E. Considered only quan ta ve details F. MIS is not a subs tute for effec ve management G. Hoarding culture = Reduce effec veness H. Changes in Top-M = Reduce effec veness 27.DSS – Decision Support System Ans.: Computerized informa on System that supports ‘Business & Organiza onal DM Ac vi es’ 28.Characteris cs of DSS Ans.: A. Supports DM B. Focuses on DM C. Used for DM D. Used for group DM E. Flexible & adaptable F. Extensive & evolve over a me G. Can be used for ‘Structured Problem’ (Effec ve at Top-M) H. User friendly I. Easy to use 29.Components of DSS Ans.: 1. Users, 2. Database, 3. Planning Language 4. Model Base
  • 17. 7 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 30.Examples of DSS in Accoun ng Ans.: A. Cos ng B. Capital Budge ng C. Capital variance analysis system D. General DSS 31.Difference between DSS & Tradi onal MIS Ans.: No Points DSS MIS 1 Focus DM Process Informa on requirement analysis 2 Used for Unstructured / Semi-structured DM Structured DM 3 Orienta on External Internal 4 Flexibility High Rela vely Low 5 Analy cal High Low 6 Provide Integrated tools, data models & language to users Structured informa on to end users 32.EIS – Execu ve Informa on System Ans.: Used specifically by Top-M The powerful focus of an EIS is due to the saying “what gets measured gets done.” 33.Characteris cs of EIS Ans.: A. Future orienta on B. Informal source C. Lack of structure D. Low level of details E. High level of uncertainly 34.Content of EIS Ans.: Whatever is appropriate to include in EIS (interes ng to execu ves) For that we have 6 Principles to guide design of EIS: A. Easy to understand & collect B. Based on balanced view C. Encourage to Management & Staff – to share Ownership D. Evolve to meet changing demands E. Performance indicator must reflect ‘Everyone’s contribu on’ F. Informa on available to Everyone
  • 18. 8 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 35.OAS – Office Automa on System Ans.: Ac vi es for OAS A. Document Capture B. Document Crea on C. Receipts & Distribu on i.e. Correspondence D. Filling, Search, Retrieval & Follow up E. Calcula ons F. Recording U liza on of Resources 36.ES – Expert system  An Expert System is highly developed DSS that u lizes knowledge generally possessed by an expert to share a problem.  Expert Systems are so ware systems that imitate the reasoning processes of human experts and provide decision makers with the type of advice they would normally receive from such expert systems. Need of Expert System: 1. Expert labor is expensive and scarce. Knowledge workers employee, who rou nely work with data and informa on to carry out their day-to-day du es are not easy to find and keep and companies are o en faced with a shortage of talent in key posi ons. 2. Moreover, no ma er how bright or knowledgeable certain people are, they o en can handle only a few factors at a me. 3. Both these limita ons imposed by human informa on processing capability and the rushed pace at which business is conducted today put a prac cal limit on the quality of human decision making this pu ng a need for expert systems.
  • 19. 9 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 2 – Informa on Systems Concepts Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 2 : ISs Concepts 37.ERP – Enterprise Resource Planning Ans.:  Now, firms are replascing legacy stems with newer client / server based solu ons  Main feature is integrated so ware.  ERP is one of the latest high end solu ons that seek to streamline & integrate opera on processes & informa on flows in the company to synergize five major resources of organiza on i.e. Men, Money, Market, Machine & Material.  ERP is a fully integrated business management system that integrates the core business & management processes to provide an organiza on a structured environment in which decisions about demand, supply, personnel, finance, logis cs etc. are fully supported by Accurate & Reliable Real me informa on.  An ERP system is mul -module so ware that integrates all business processes & func ons of the en re enterprise in “A single So ware System” using a single integrated database.  Modules of ERP: 1. Finance & Accoun ng System 2. Produc on 3. Marke ng 4. Payroll 5. Quality Control 6. CRM – Customer Rela onship Management 7. Logis c & SCM – Supply Chain Management 8. Cost Controls & Investment Management etc.  Components of ERP Module: 1. So ware Component 2. Process Flow 3. Customer Mindset 4. Change Management ---- XXXX ---- XXXX ----
  • 20. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 1. What is informa on security? Ans.: The protec on of valuable assets against loss, damage & disclosure Where valuable assets = Data /informa on recorded, processed, stored, shared, transmi ed / retrieved from an e-medium. i.e. Security of data / info. While transmi ed through e-medium. 2. What is the Informa on security objec ve? Ans.: The protec on of the interest of those relying on informa on & Protect ‘the IS & Communica ons that deliver informa on’ from harm resul ng from failure of CIA – Confiden ality, Integrity & Availability. 3. What informa on is sensi ve? OR Provide best examples of cri cal informa on for organiza on. Ans.: A. Strategic Plans B. Business Opera ons C. Finance 4. What is Informa on Security Policy? Ans.:  The statement… of inten on by management about ‘How to protect a company’s informa on assets’.  Should be in wri en form.  This is a formal statement of Rules.  Does not specify technologies / specific solu ons but it defines “set of inten ons & condi ons that help to protect company’s informa on assets & its ability to conduct business”.  The essen al founda on for an effec ve & comprehensive informa on security program. 5. How to implement policy in any organiza on? Ans.: Tools to implement policy in any organiza on… (SGP) A. Standards (Uniform & Compulsory) Specify technologies & methodologies to be used to secure systems B. Guidelines (Best Prac ces & Op onal) Help in smooth implementa on of informa on security policy & Standards C. Procedures (Detailed Steps to be followed) More detailed steps to be followed to accomplish par culars security related tasks Such procedure normally assists in implemen ng applicable Info. Sec. Policy Opera onal & Compulsory instruc ons to be followed
  • 21. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 6. For what aspects policy is required? Ans.: A. Use of IS resources B. Physical Security C. Data Security D. Online Security E. Micro computer use F. Review, evaluate & purchase of Hardware & So ware G. System Development Method H. Applica on Program Changes 7. What is the objec ve of controls? Ans.: To reduce / if possible eliminate The causes of the exposure to poten al loss i.e. A. Error & Omission B. Improper Authoriza on & Accountability C. Inefficient Ac vity Two Main Purposes: A. Outline policies of the organiza on as laid down by Management B. A benchmark for evalua on ‘Whether control objec ves are achieved?’ 8. Which controls is lack in CBIS? Ans.: Lack of controls in CBIS: A. Lack of Management understanding of IS Risks B. Absence / inadequate ‘Framework for IS controls / general controls C. Absence of / Weak IS controls / general controls D. Lack of awareness & knowledge of IS controls / general controls E. Complexity of implementa on of controls in distributed compu ng environment F. Lack of control feature / their implementa on in highly technology driven environment G. Inappropriate technology implementa on / inadequate security func onality in technologies implemented. 9. Explain - Types of control Ans.: Based on objec ves of controls… Types Preven ve Controls Detec ve Controls Correc ve Controls Meaning Designed for / to Prevent from Occurring – Any error / omission & malicious act Designed for / to Detect & Report – Any error / omission & malicious act Designed for / to Iden fy & Reduce impact / Correct – Any error / omission & malicious act
  • 22. 3 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS Characteris cs A. Clear-cut understanding of vulnerabili es of the assets B. Probability of threats C. Prior for controls A. Iden fy in progress B. Understanding of lawful ac vity C. Report unlawful D. Interac on with preven ve & correc ve controls E. Surprise check A. Iden fy cause of problem B. Provide Remedy / medicines C. Reduce Impact D.Correc ng Error E. Modify system for future F. Feedback from Preven ve & Detec ve Controls Example A. Firewall B. Password C. An virus SW D. Qualified Staff E. Segrega on of duty F. Employee training A. Hash total B. IDS C. BRS D. Variance Analysis E. Audit F. Monitoring A. BCP & DRP B. Re-run procedure C. Back-up procedure Compensatory Controls Meaning A. Designed to reduce probability of threats B. Based on “Cost of lock of asset should not be more than value of asset” i.e. implement not appropriate control but compensatory measure in this case, Due to difference constraints. C. Not as effec ve / efficient as Appropriate control Based on objec ves of Nature of IS Resources… A. Environmental Controls B. IS Opera onal Controls C. IS Management Controls D. SDLC Controls E. Physical Access Controls F. Logical Access Controls Based on objec ves of Nature of func on… A. Internal Accoun ng Controls B. Opera onal Controls C. Administra ve Controls 10.What are the major control techniques in organiza on? Ans.: A. Organiza onal Controls B. Management Controls C. Financial Controls
  • 23. 4 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS D. Data Processing Environment Controls E. Physical Access Controls F. Logical Access Controls G. SDLC Controls H. BCP Controls I. Applica on Controls 11.Explain - Job Descrip ons Ans.: o It establish… A. Instruc ons on “How to do the job?” B. Policy define the authority of the employee. o It communicate “Management’s specific expecta on from job performance”. o All jobs must have a current documented job descrip on readily available to employee o Establish responsibility & accountabili es. 12.What is ‘Segrega on of du es’? Ans.: A. Common control technique aimed at “Separa ng Conflic ng Job Du es” (i.e. Distribu on of work responsibili es – Maker cannot be checker) B. Main purpose – to prevent / detect errors / irregulari es, serves check on work done by others, make collusion necessary to commit a fraud. C. Organiza onal controls structures should be designed in a manner that ensure ‘Highest level of separa on of du es’. D. Factors to be considered – I. Nature of business opera ons II. Managerial policy III. Organiza onal structure with job descrip on IV. IS resources deployed 13.Explain - Management controls Ans.: Management controls shall include… A. Responsibility B. An official IT Structure C. An IT Steering Commi ee 14.Explain - Financial Controls Ans.: A. Authoriza on B. Budgets C. Documenta on D. Cancella on of Documents E. Input / Output varia on F. Serially numbered Docs (Sequen ally) G. Safekeeping
  • 24. 5 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS H. Supervisory Review I. Segrega on of Du es J. Dual Controls (2 people have Simultaneously access on an asset) 15.What is Audit Trails? Ans.: Audit trails are logs (i.e. chronological list of the ac vi es performed) that are designed to record ac vity at the system, applica on & user level. It is type of detec ve controls and generally, used in every organiza on. 16.Who are the members of Security Policy? Ans.: Comprises of… A. Managerial – Management member, who have budget & policy authority B. Technological – Technical group, who know what can / cannot be supported C. Legal – Legal Expert, who know the legal ramifica on of various policy changes 17.Explain - Types of Security Policy I) User Security Policy (i.e. for secure use of the system by users) Set Responsibili es & Requirements and provide reference to all users A. User Security Policy B. Acceptable Usage Policy - Set out the policy for acceptable use of email & internet services II) Organiza onal Security Policy (i.e. for security of organiza onal informa on systems, network & informa on resources) A. Organiza onal Informa on Security Policy Group Policy for security of informa on assets & IT system processing informa on and it is main IT security policy documents B. Network & System Security Policy Detailed policy for system & network security and apply to IT department users. C. Informa on Classifica on Policy Policy for classifica on of informa on III) Condi ons of Connec on: Group policy for connec ng their network Applies to all organiza on connec ng to group & relates to condi ons that apply to different systems of supplier. 18.What are the components of security policy? Ans.: A. Security policy infrastructure B. Security organiza on Structure C. Descrip on of technologies & compu ng structure D. Inventory & classifica on of assets E. Physical & Environmental security F. Iden ty Management Access Control G. SD & Maintenance Controls
  • 25. 6 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS H. IT Opera ons Management I. IT Communica ons J. BCP K. Legal Compliances L. Security policy document maintenance & compliance requirement M. Purpose & scope of document & intended audience N. Monitoring & Audi ng Requirement O. Underlying Technical Policy P. Incident Management – Response & Repor ng 19.What is IS Controls / Internal Controls? Ans.: Control = Policies, Procedures, Prac ces & enterprise structure that designed to provide reasonable assurance that A. The business objec ve will achieved B. Undesired events are prevented / detected & corrected. 20.Explain - Impact of technology on internal controls Ans.: (RMC Access SAP) A. Record keeping B. Management Supervision & Review C. Concentra on of programs & data (Centraliza on) D. Access to Assets & Records (Physical & Logical Controls) E. Segrega on of Du es F. Authoriza on Procedure G. Personnel (Competent & Trust worthy – Appropriate skills & training required and know “What they are doing?”) 21.What are the Components of internal controls? Ans.: (As per COSO – Same concept in Audit) – CRC IM A. Control Environment: The control consciousness of organiza on i.e. atmosphere B. Risk Assessment: Iden fy & analyze risks faced by an org. to manage them. C. Control Ac vi es: Ac ons to manage & Reduce risk assessed D. Monitoring: Elements that ensure internal controls operate reliably over a me E. Informa on & Communica on: Informa on Iden fied, captured & exchanged in mely & appropriate form to discharge responsibility.
  • 26. 7 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 22.Explain - Boundary Controls Ans.: A. Major Boundary Controls – ACM: Access Control Mechanism Access control is implemented with ACM, link authen c user & access to authorized resources they are permi ed. ACM = IAA No IAA What You Class of info. Example 1 Iden fica on Know? Personal Info. Name, DOB, PW, Pin 2 Authen ca on Are? Personal Characteris cs Voice, Signature, Fingerprint 3 Authoriza on Have? Personal Objec ves ID Card, Badge, Key, Smart Card B. Boundary Control Technique: I) Cryptography It is a process of Transforming ‘data into codes / cypher text’ that are meaningless to anyone, who does not possess the authen ca on to access the resource/file. (i.e. encryp on & decryp on) II) Password III) Iden fica on IV) Biometric Card C. Input Controls Ensuring accuracy & completeness of data & instruc on input entered into an applica on system Those controls are ‘Preven ve in nature’ and called ‘Front end applica on controls’. D. Processing Controls Perform valida on checks to iden fy errors during process and detec ve in nature Ensure accuracy & completeness of data being processed. Generally, this control enforced by DMBS. E. Output Controls Ensure data delivery to users will be preven ve, forma ed & delivered in consistent & secured manner and ensure CIA of data. F. Database Controls Designed to protect integrity of DB, when applica on so ware acts as interface, to interact, between user & DB. I) Update Controls – All record processed, sequence check, maintain suspense account and etc. II) Report Controls – Print run to run control totals, standing data (updated), Existence / recovery controls, Print suspense account and etc.
  • 27. 8 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 23.Explain - Informa on Classifica on Classifica on is based on sensi vity or confiden ality of informa on and not based on value or cost of informa on. No Class Meaning Control / Security Req. Example 1 Top Secret That can cause serious damage to organiza on, if lost / made public Highest Level Formula of Coca-Cola 2 Highly Confiden al Cri cal for ongoing business opera on & can cause serious impediment (Slow down) if share around organiza on Very high Product related decision etc. 3 Proprietary Rela ng to procedures, opera onal, rou ne works, project plans, designs etc. (only for authorized personal) High Payroll Data 4 Internal Use only Cannot be circulated outside the organiza on & if disclosed, will created inconvenience to organiza on but not result in financial loss Normal Manager going to re re in future 5 Public Docs Informa on published in public domain i.e. (of public use etc.) [Control - only for integrity is Req.] Minimal / No Control B/S, P&L, FS etc. 24.What are the data integrity controls? Ans.: They protect data from accidental / malicious – alterna on / destruc on & provide assurance to user that informa on meets expecta ons about its quality & integrity. Categories of integrity controls: A. Source data controls B. Input valida on rou nes C. Online data entry controls D. Data processing & data storage controls E. Output controls F. Data transmission controls 25.What are the data integrity policies? Ans.: A. Virus signature upda ng (Automa c) B. So ware tes ng C. Division of environment D. Offsite backup storage (older than 1 month to permanent storage) E. Quarter & year-end backup F. DRP – Disaster Recovery Planning
  • 28. 9 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 26.Explain - Logical Access Control Ans.: LAC are implemented to ensure that only authorized users have access to system, data & programs, So as to safeguard informa on from unauthorized disclosure, modifica on & use i.e. maintain CIA. Steps to be followed = ACM = IAA 27.What are the Logical Access paths in any system? Ans.: A. Online Terminals:  For access has to provide valid login ID & PW  Addi onal authen ca on mechanism is also required  Operator Console:  The crucial place where any intruder can play havoc, therefore, must be restricted.  Keep it at loca on = visible to all + accessible by only authorized personnel B. Dial-up Ports:  User at one loca on can connect remotely to another computer present at unknown loca on via telecommunica on media  Modem act as interface between remote terminal & telephone line.  Security is achieved by providing ID & PW for access. C. Telecommunica on Network  It is a number of computer terminals, PC etc. are linked to host computer through network / telecommunica on lines.  That can be private / public & security required = same as in online terminals. 28.Explain - Technical Exposure (need to remember all the points) Ans.: i.e. Unauthorized implementa on / modifica on of data & SW. i) Data Diddling –  Changing data before / as & when entered into the system  Limited technical knowledge required  Worst Part = Occurs before computer security can protect data ii) Bombs –  "A piece of bad code” deliberately planted / entered by insider / supplier of so ware.  When gets triggered – causing the damage immediately but cannot infect other programs. A. Time Bomb: (Triggered by Time)  Computer clock ini ates it.  Time bomb causes perverse ac vi es. i.e. disrup on of computer system, modifica on or destruc ons of stored informa on etc on par cular date & me. B. Logical Bomb: (Triggered by Combina on of events)  Ac vated - by combina on of events.
  • 29. 10 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS iii) Trojan Horse:  Bomb but no need to be triggered = Trojan Horse  Malicious programs hidden under any authorized program  Or else “illicit coding in legi mate program”  Hide in host program & do not damage host program  Cannot copy themselves to other so ware or program but can be transferred to other system only if unsuspec ng user copies the Trojan. iv) Worms:  Does not require host program like Trojan / Bomb  Therefore, Worm program copies itself to another machine on network.  Since, it is standalone program = detected easily.  Sabotage (Deliberately Destroy) the system & they can also be used to perform some useful task s (like, check connec vity of the network) v) Rounding Down: (10032.05 = 10032)  Small frac ons of denomina on & transfer to authorized account (rarely no ced) vi) Salami Techniques: (10032.05 = 10030)  Slicing of small amount of money (here, last few digits – Rounded off) vii)Trap Doors (Back Door):  They are exists “out of an authorized program” & allow inser on of specific logic, such as program interrupts that permit a review of data.  They also permit access to unauthorized logic in program. 29.What is Asynchronous A acks (AA)? Ans.:  Generally on telecommunica on lines, numerous transmissions must wait for clearance of line before data being transmi ed.  Data that are wai ng to be transmi ed are liable to unauthorized access called AA.  AA is Hard to detect because very small. Forms: A. Data leakage B. Wire Tapping C. Piggybacking – (Unauthorized person behind authorized person in Org.) D. DOS – Denial of Service A ack 30.Explain - Computer Crime Exposure Ans.: A. Financial loss B. Legal repercussions C. Loss of credibility (Consequence) D. Blackmail / industrial espionage – Process to learn secret info. With illicit purpose E. Disclosure of confiden al / sensi ve / embarrassing info. F. Sabotage G. Spoofing (Steal iden ty of other)
  • 30. 11 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS 31.What are the Logical access controls across the system? Ans.: A. User Access Management –  User Registra on,  Privilege Management,  User Password Management,  Review of user access rights B. User Responsibility –  Password use,  Una ended user equipment C. Network Access Controls –  Policy on use of network services,  Enforced path,  Segrega on of networks,  Network connec on and rou ng control,  Security of network services D. OS Access Controls –  Automated terminal iden fica on,  Terminal log-on procedures,  User iden fica on and authen ca on,  Password management system,  Use of system u li es,  Duress alarm to safeguard users,  Terminal me out,  Limita on of connec on me E. Applica on & Monitoring System Access Control –  Informa on access restric on,  Sensi ve system isola on,  Event logging,  Monitor system use,  Clock synchroniza on F. Mobile Compu ng G. 32.Explain - Physical Access Controls Ans.: Control over tangible resources & intangible stored in tangible media. Issues & exposures: Results of accidental / inten onal viola on of access path… A. Abuse of data processing resources B. Blackmail C. Embezzlement
  • 31. 12 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS D. Damage / the to equipment / document E. Public disclosure of sensi ve informa on F. Unauthorized entry 33.Explain concept of Access Control Mechanism (ACM). Ans.: Associates with iden fy & authorize the users, the resources they are allowable to access & ac on privileges. A. Iden fica on Users have to iden fy themselves + intent request for usage of system resources B. Authen ca on User must authen cate & mechanism must authen cate itself C. Authoriza on Check user request resources are allowed to access, then provided access. Two approaches: I) Ticket Oriented Approach:  Assigns a cket for each resource they are permi ed to access.  Operates by row in matrix  Holds ac on privileges + Resources  Advantage = Run me efficiency, can be used for large number of users efficiently. II) A List Oriented Approach:  Associates with each resource a list of users who can access the resources & privileges.  Allows efficient admin of capabili es  Large number of users then = inefficient (i.e. for small no. of users) 34.What are the Physical Access Controls? Ans.: i. Locks on doors A. Cypher lock  Push bu on panel  Computer coded with person’s handprint B. Bol ng Door Locks – Open by only Metal key + Avoid to be duplicated C. Electronic Door Locks Gain: i) Iden ty specie individual ii) Restricted to specific area + specific hours iii) Degree of duplica on iv) Deac vate on termina on / stolen etc. v) Accoun ng & Provide card = IMP part of admin. D. Biometric Door Locks
  • 32. 13 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 3 – Protec on of Informa on System Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 3 : Protection of IS ii. Physical Iden fica on Medium: PIN, Plas c Card, Iden fica on Badges iii.Logging on Facili es: Manual Logging, Electronic Logging iv.Other means of Controlling Physical Access – Video Cameras, Security Guards, Controlled Visitor, Bonded Personnel, Dead Main Doors, Non-Exposure of Sensi ve Facili es, Computer Single Entry Point, Alam System, Perimeter Fencing, Control of out of hours of employee, Secured Report/Document Distribu on Cart. 35.What is cyber fraud? Ans.: Fraud enabled by technology = cyber fraud With the advancements in the technology, cyber frauds are also increasing day-by-day across the world. One of the major reasons behind the rise of such frauds are:  Failure of internal control system,  Failure of organiza ons to update themselves to new set of risk, and  Smart fraudsters: These are people who are able to target the weaknesses in system, lacunae’s in internal controls, even before the organiza on realizes that such gaps are there. 36.What are the major techniques to commit cyber fraud? Ans.: A. Hacking – White hat hacker B. Cracking – Black hat hacker C. Phishing D. Spoofing / Masquerading / impersona on E. Data Digging F. Data Leakage G. DOS – Denial Of Service H. Time / Logical Bombs I. PassWord Cracking J. Rounding Down K. Slami Technique L. Severing / Dumpster Diving / Data Dumping M. Social Engineering Techniques N. Super Zapping O. Trap Door etc. ---- XXXX ---- XXXX ----
  • 33. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP Chapter covers following topics… A. DRP – Disaster Recovery Planning B. CM / IM – Crisis Management / Incident Management C. BCP – Business Con nuity Planning D. BCM – Business Con nuity Management 1. What is DRP? Ans.: Disaster = Event which is very destruc ve DRP = Technologies aspect of BCP i.e. the advance planning & prepara on … Necessary to minimize losses & Ensure con nuity of cri cal business func on of organiza on in the event of disaster. 2. What are the components of DRP (Plans of BCM / BCP / DRP)? Ans.: DRP = Combina on of 4 plans Emergency Plan + Backup Plan + Recovery Plan + Test Plan A. Emergency Plan: Specify the ac ons to be undertaken immediately, when disaster occurs. Management must iden fy those situa ons that require the plan to be invoked. Covered four aspects… i) Person to be called & no fied ii) Ac ons to be taken iii) Evalua on Procedure iv) Return (to business Place) Procedure B. Backup Plan: i) Type of backup ii) Frequency (i.e. period) of backup iii) Procedure for backup iv) Loca on of backup resources v) Site – Where resource can be assembled & opera on can con nue vi) Personnel – Responsible for gathering backup vii) A me frame for recovery of each system Types of backup: i) Full Back up:  Backup contains “Every file in backup set “.  Large amount of me & space required + expensive than other  Restora on of data is faster.
  • 34. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP ii) Differen al Back up:  Backup contains “That all files changed since LAST FULL Backup”.  Faster & Economic than full backup and most efficient one. iii) Incremental Back up: Backup contains “That all files changed since LAST ANY TYPE of Backup”. i.e. last full backup / differen al backup / incremental backup. It is most economical but difficult to restore & take li le bit more me. iv) Mirror Backup: It is full back up as name suggest. Except: Not compressed in Zip & Not password protected. Alternate Processing Facili es Arrangement / Site: i) Cold Site: (0%) (When we can tolerate down me) Need to install all facili es on the event of disaster. No mainframe will be installed by organiza on. ii) Worm Site: (50%) Cold site + Hardware facili es installed i.e. installed hardware that might be difficult to obtain / install (on disaster). It is intermediate level of backup. iii) Hot Site: (100%) (When faster recovery is cri cal) All hardware, So ware, Data & Supplies = Installed = Ready to use. It is most expensive one. Generally, it is shared with other organiza on. iv) Reciprocal Agreement: Two / more organiza on - Agree to provide back facili es to each other on the event of disaster. Cheap but both should have sufficient capacity for the same. v) 3rd Party Arrangement / Outsourced: Must have contract for following… A. How soon site will be available B. No. of organiza ons – allowed concurrent use C. Priority to be given D. Time period – site can be used E. Condi on for use of site F. Facili es & Services – that will make available G. Controls will be placed.
  • 35. 3 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP C. Restore Plan: Setout – procedure to restore full is capabili es. I) Iden fy recovery commi ee – responsible for recovery II) Specifies the responsibili es of commi ee & guidance on priori es to be followed III) Members of commi ee – understand their ‘Responsibili es’ IV) Might indicate – ‘Applica ons are to be recovered first’ D. Test Plan: The plan = s ll unfamiliar, need to test!!! Therefore, final step = Test the DRP. Purpose of test – i) To iden fy difficul es in all above 3 plans ii) Readiness of organiza on & its personnel for facing disaster. It must enable organiza on – i) To simulate effect of disaster ii) Specify criteria by which 3 plans results sa sfactory. But Management may be unwilling for periodically test – i) Daily opera on disrupted ii) Test = may results Real Disaster 3. What is Crisis Management / Incidental Management Planning? Ans.: CM/IM means the overall co-ordina on of organiza on’s response to a crisis in effec ve & mely manner with a view to avoiding / minimizing damage to organiza on’s profitability, reputa on & ability to operate. 4. Explain - Risk Management (From Chapter – 1) Ans.: RM = Process of iden fying & assessing risk, taking steps to reduce risk to the acceptable level & maintaining that level. Process = Risk Assessment Procedure… A. Iden fy informa on assets & category of informa on B. Valua on of that assets C. Iden fy vulnerability & threats D. Risk Assessment = Probability of Occurrence + Poten al Loss E. Strategies for Risk Management: i. Turn back / ignore – When very low impact ii. Tolerate / Accept – When minor, Periodical review required iii. Terminate / Eliminate – by Replacement iv. Transfer / Share – by Sharing with partner v. Treat / Mi gate – Eliminate from the origin
  • 36. 4 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 5. What is Asset? Ans.: Asset = Something of value to organiza on. Include any of the following… i. Value to organiza on ii. Not easily replaceable iii. Organiza on’s corporate iden ty & without which organiza on may threatened iv. Data classifica on of these asset – Top Secret OR Highly Confiden al OR Proprietary 6. What is Vulnerability? Ans.: Vulnerability = Inherent weakness in system safeguards that exposes the system to threats. Any one of the following condi on… Allow a ackers i. To execute commands as another user ii. To access data that is contrary (Unauthorized) iii. To pose as another en ty (Spoofing) iv. To conduct DOS (Denial of Service – A ack) 7. What is Threat? Ans.: It is an event that exploits the vulnerability of asset to cause serious damage to asset. i.e. Any en ty, circumstances / event through, unauthorized access, destruc on, modifica on, DOS etc. It has capability to a ack on a system with intent to harm. Asset & threats are closely correlated without target asset threat cannot exist. 8. What is Likelihood / Pi of threat? Ans.: Likelihood of threat occurring is the “Es ma on of Probability (Pi) that the threat will succed to achieve undesirable event i.e. Pi of threat materialized. 9. What is Exposure (i.e. impact)? Ans.: Extent of loss the organiza on has to face when a risk / threat materialized Not just immediate impact but a “Real Harm” long run, also. 10.What is a Risk? Ans.: Risk = The poten al harm caused if a par cular threat exploits the vulnerability to cause damage to the asset Risk Analysis = The process of iden fying security risks & determining their magnitude & impact on organiza on. Risk Assessment = Procedure as already done above
  • 37. 5 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 11.What is Countermeasure? Ans.: Ac on, procedure, technique / other measure that “Reduces the vulnerability of component or system is countermeasure”. 12.What is Residual Risk? Ans.: Any risk s ll remaining a er the counter measure analyzed & implemented = Residual Risk 13.Explain - Sources of risk Ans.: Most important step of risk management to iden fy sources of risk i.e. area from where risk can occur. Common sources are… (NEP TC MIH) A. Natural events B. Economic events C. Poli cal Circumstances D. Technology & Technological issue E. Commercial & legal Rela onship F. Management ac vity & Control (Internal Factor) G. Individual Ac vi es H. Human Behavior 14.Explain – Business con nuity Planning (BCP) Ans.:  It is crea on & valida on of “A prac cal logis cal plan”  For how an organiza on will… A. Recover & restore par ally / completely B. Interrupted cri cal func ons (CBF) C. Within predetermined me a er disaster / extended disrup on.  Plan = for running business under stressful & me compressed situa ons.  Plan lays out steps to be ini ated on occurrence of disaster, comba ng (fight) it & returning to normal opera ons. 15.Explain - Objec ves & Goals of BCP Ans.: A. Provide safety & well-being of people on premise on disaster B. Cri cal business lines & func ons C. Con nue Cri cal Business Opera ons D. Reduce dura on of serious disrup on to opera on & resource E. Reduce immediate damage & losses F. Facilitate effec ve Co-Ordina on of recovery tasks G. Reduce complexity of recovery efforts / tasks.
  • 38. 6 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 16.What are the goals of BCP? Ans.: A. Iden fy “Weakness” & implement “A disaster Preven on Program” B. Reduce dura on of a serious disrup on to business opera ons C. Facilitate effec ve Co-Ordina on of Recovery Tasks D. Reduce Complexity of Recovery Tasks 17.Explain - Phases of BCP Ans.: A. Pre-planning Ac vi es (Understand – Exis ng & Projected System) B. Vulnerabili es Assessment & General Defini on Requirement C. BIA D. Detailed Defini on of Requirement E. Plan Development F. Tes ng Program G. Maintenance Program H. Ini al plan tes ng & plan implementa on 18.Explain - Business Impact Analysis (BIA) Ans.: Essen ally, a means of systema cally assessing the poten al impact resul ng from various incident / event / disaster… A. Iden fy cri cal system, process & func ons B. Assess economic impact of incident & disaster that result in denial of access to the system, services & facili es. C. Assess “Pain Threshold = Length of me Business unit can survive without system, services & facili es” D. Iden ty & understand – The degree of poten al loss Steps: i) Iden fy organiza onal risk ii) Iden fy cri cal business func on iii) Iden fy + Quan fy threats / risks to cri cal business func ons (CBF) iv) Iden fy dependencies & interdependencies of CBF v) Determine maximum allowable “Down Time” i.e. Pain Threahold vi) Type & Quan ty of resources required for recovery tasks vii) Determine impact Ways to gathering informa on: A. Examina on of Documents B. Interviews C. Examina on of Documents D. Workshops BIA Report should be presented to “Steering Commi ee”, specify CBF & Pain Threshold
  • 39. 7 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 19.What are the objec ves of Plan Development? Ans.: Objec ve A. To determine the available op ons & formula on of appropriate alterna ve opera ng strategies, B. To provide mely recovery for all cri cal process & their dependencies. i.e. two ered strategy A. Business – Logis cs, Accoun ng & HRM etc B. Technical – IT = PC, LAN, Network, DBMS etc. 20.Explain - Business Community Management (BCM) Ans.: BCM = Planning + Develop + Running + Maintaining + Monitoring BCM – business owned & business driven process that establishes “A fit for purpose strategic & opera onal framework” A. Improves enterprise’s resilience against disrup on B. Rehearsed method of restoring enterprise’s ability to supply its key products & services to agreed level within an agreed me a er disaster. C. Delivers proven capabili es to manage a business disrup on & protect reputa on & brand. 21.What is BCM Policy? Ans.: It defines processes of se ng up ac vi es for establishing a BC capability & ongoing Management & Maintenance of BC Capability. Objec ve = A structure through which… A. CBF – iden fied B. Plan developed for con nuity of CBF C. Manage IM & BCP D. Subject – IM & BCP to ongoing tes ng, revision & updates as required. E. Assign – Planning & Management responsibility to a number of relevant senior management team. 22.Explain - Components of BCM Process Ans.: A. BCM Management Process B. Informa on Collec on C. Strategy Process D. Development & Implementa on Process E. Tes ng & Maintenance Process F. Training Process
  • 40. 8 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 23.Explain - BCM Management Process Ans.:  Address “the objec ves” defined in “BC Policy” by providing organiza on structure with responsibili es & authority for implementa on & maintenance (I&M) of BCM.  Organiza on should nominate a person / team with appropriate seniority & authority to be accountable i.e. Clearly defines person responsible for I & M of BCM in organiza on.  Top Management should appoint the manager (BCM) responsible for ongoing I & M of BCM within their area of responsibility. i.e. system manager responsible for their func onal area.  Implementa on should include following ac vi es A. Defining the scope & context B. Defining the role & responsibility C. Regular tes ng of program D. Maintaining up to date & appropriate BCP E. Reviewing, reworking & upda ng BCP, RA & BIAS F. Convert policies & strategies into ac ons G. Managing costs & benefits H. Engaging & involving stakeholders  BCM documents required to be maintain (for minimum One Year) A. BC Policy B. BIA Report C. BCM System D. RA Report etc… (Complete from SM/PM) 24.How to classify the cri cal ac vi es? Ans.: A. BIA – same as above B. Classifica on of cri cal ac vity (CBF): BIA will be used in categoriza on (DEV) of infrastructure & business func on by disaster scenario (Trivial, Minor, Major & Catastrophic) for various disaster causes. D – Desirable E – Essen al V – Vital For following chart, A. Axis – X: Business Categories Based on Loss of Revenue, Loss of Reputa on, Loss of Produc vity and Reduc on in sa sfac on Determine – Grade i.e. 123 / DEV / LMH B. Axis – Y = Pi of occurrence of disaster C. Catastrophic, Major, Minor & Trivial = Disaster Scenario decided from graph D. RA – same as above
  • 41. 9 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 4 – Business Con nuity Planning & Disaster Recovery Planning Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 4 : BCP & DRP 25.Explain - Documenta on required for BCM Ans.: All documents that form the BCM are subject to the document control and record control processes. The following documents (representa ve only) are classified as being part of the business con nuity management system: A. The business con nuity policy; B. The business con nuity management system; C. The business impact analysis report; D. The risk assessment report; E. The aims and objec ves of each func on; F. The ac vi es undertaken by each func on; G. The business con nuity strategies; H. The overall and specific incident management plans; I. The business con nuity plans; J. Change control, preventa ve ac on, correc ve ac on, document control and record control K. processes; L. Local Authority Risk Register; M. Exercise schedule and results; N. Incident log; O. Training Program. ---- XXXX ---- XXXX ----
  • 42. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC Chapter covers following topics… A. Business Process Design B. System Development Process C. Reasons for failure to achieve SD Objec ve D. System Development Team E. Roles in SDLC F. Approaches for SD (How to Develop?) G. Methodology for SD H. SDLC (Benchmark Steps, to develop any system) 1. Explain - Business Process Design OR Business Process Re-engineering (BPR) Ans.:  It involves improving the exis ng business system by restructuring the business tasks, func ons & ac vi es etc.  Example: Conversion from legacy IS to ERP, it will require restructuring of business tasks, func on etc.  3 Steps: A. Understanding & Documen ng the exis ng system B. Proposed business Processes documenta on C. Implemen ng new business processes 2. What is the System Development Process? Ans.:  It is iden fica on of exis ng business situa on with an aim for improving those situa ons & then pu ng up an IS in place for achieve that aim.  Key important phases: A. System Analysis – Requirement Analysis (Thoroughly) to improve exis ng system Exis ng System  Problem in Exis ng (Remove)  Addi onal Proposed Requirements Total Requirements Analyzed B. System Design – Based on requirement analyzed Convert into the System Design i.e. Flow Chart, Data Flow Diagrams etc… 3. Reason for failure – to achieve System development objec ves Ans.: User Related Issues: A. Shi ing / Changing user needs B. Resistance to change C. Lack of user par cipa on D. Inadequate tes ng & user training
  • 43. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC Developer Related Issues: A. Difficult to define the exact requirements par cularly for unstructured / strategic system. B. New Technologies C. Lack of senior management support & involvement D. Lack of standard project management & system development methodologies E. Over worked / Under trained development staff 4. System Development Team: Ans.: A. Steering Commi ee: Usually consists of a group of key IS Plans & Applica on developments It ensures that ongoing systems development ac vi es are consistently aimed at sa sfying the informa on requirement of managers & users. i.e. by Review of “Progress of Project” B. IS Department: Responsible to Develop system C. Project Management: Co-ordinate Development Ac vi es of system i.e. computer professional & Key users D. System Analysts: Assigned to determined user requirements, design the system and assist in development & implementa on ac vi es. 5. Roles of SDLC Ans.: A. Steering Commi ee B. Project Manager C. Project leader D. System Analyst / Business Analyst E. Module leader / Team leader F. Programmer / Coder / Developer G. DBA – Database Administrator H. Quality Assurance I. Tester J. Domain Specialist K. IS Auditor: Ensure that applica on development also focuses control perspec ve. Need to involve in design phase & final tes ng phase to ensure existence & opera ons of controls in new so ware.
  • 44. 3 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC 6. System Development Approaches Ans.: A. Tradi onal / Waterfall Approach –  Phases of SDLC – one by one  Many refinements are provided  Ini al model organized in liner order output of one phase become input of next phase and assumes no defect is introduced during any phases of life cycle  Refinements: i. In actual SD, the defect / error, get introduced in any of the phase of LC. It is preferable to detect & correct in the same phase But it is not always possible i.e. provision of feedback path introduced. ii. Two/more phases to be conducted, simultaneously. i.e. not one by one but parallel B. Prototype Model –  Before development of actual so ware a working prototype of system should be build, first.  Toy implementa on of system, provides… i. Limited func onal capabili es ii. Low reliabili es iii. Inefficient performance But help to understand the exact requirement from system. Generic Phases of Prototype Model: i. Iden fy informa on system requirement ii. Develop the ini al prototype iii. Test & Revise iv. Obtain user signoff of the Approved Prototype
  • 45. 4 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC C. Incremental Approach –  Combine both Waterfall & Prototype model.  So ware product is built incrementally through different itera ons.  Does not a empt to start with full specifica on of requirements but develop by itera on of review. D. Spiral Model/ Evolu onary Model –  Similar to incremental model  But with more thrust on risk analysis & resolu on.  It also combines waterfall & prototype models.  Ac vi es represented as Spiral rather than sequence of the ac vi es.  Each loop in spiral is phase in process & no fixed phases like other but selected based on requirement.  Risk is explicitly assessed in each spiral’s loops & risks are resolved throughout Spiral process. E. Agile Methodologies –  System development is human ac vity, therefore, there will be varia on in inputs & process.  Therefore, SD should flexible enough & agile for required changes.  Plan ac vi es as nature of project.  Follow itera ve cycle, advocates to work user and management  People oriented approach  No one by one systema cal steps required.  Rapid & Flexible – Response to change. F. RAD – Rapid Applica on Development  Designed to give – faster development & high quality result.  Maximum advantage of already developed powerful so ware for development of new so ware. (Copy old one & make required changes)  i.e. use already developed “So ware code / Programs” maximum possible.
  • 46. 5 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC  Key feature: i. Low cost ii. Quick development iii. Right quality  Useful when less me available & otherwise ‘requirement of business get changed.’  Components: i. JAD – Joint Applica on Development ii. Rapid Development Project iii. Clean Rooms iv. Time Boxing v. Incremental Prototyping vi. Tools, like – CASE, DBMS etc. 7. SDLC – System Development Life Cycle: Ans.:  SDLC is a popular system development framework, which sequence steps to system designer & developers for efficient system development.  It is document driven framework i.e. at every stage of SDLC documenta on is produced.  A phase of SDLC is not completed un l appropriate documenta on &work product is produced. Known as ‘Deliverables’.  Does produced by previous phase is important for next phase ac vity, based on it all decision will be taken. 8. Advantages of SDLC Ans.: General A. Be er planning & control by project managers B. Compliance with prescribed standard & ensure be er quality C. Documents of SDLC are important measure of communica on & control D. The phases are milestones i.e. help project manager review & signoff. Audit Perspec ve: A. Clear cut understanding of all steps & phases B. Can state in report about compliance by IS Management C. If IS Auditor has technical knowledge & capability D. Evalua on of methods & techniques used in SDLC 9. Risk & Shortcomings of SDLC Ans.: A. Time consuming B. Rigidity of approach may delay / prolong dura on C. Development team may find cumbersome D. End product – may not be for long term E. May not be suitable for small & medium sized projects
  • 47. 6 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC 10.Explicit knowledge & Tacit Knowledge Ans.: Explicit knowledge  It can be formalized easily & as a consequence is easily available the organiza on  It is ar culated, represented by spoken words, wri en material & complied data.  This type of knowledge is codified, easy to document, transfer & reproduce. Example: A. Online Tutorials B. Policy & Procedural manuals Tacit knowledge  It resides in a few o en in just one person & has not been captured by organiza on  It is unar culated & represented as intui on, perspec ve, beliefs & values that individuals form based on their experiences.  It is difficult to document & communicate the tacit knowledge. Example: Hand on skills, Special knowhow, Employee Experiences etc. -----: Phases of System Development Life Cycle (SDLC) :------ P1.Preliminary Inves ga on A. Problem Defini on B. Conduct Inves ga on i. Review internal documents ii. Conduct interview C. Iden fy – Viable Op ons D. Feasibility Study – Need to conduct i. Technical : Required HW & SW available in the market? ii. Financial : Financially viable – Affordability of Org. iii. Economical : Cost Benefit Analysis – Profit / Loss iv. Opera onal : Opera onal in org. by users – employees, customers, supplies v. Schedule/Time : Es mated me – Proposed me acceptable or not vi. Resource : Preliminarily related to availability of HR vii. Legal : Conflict between proposed system & Org. legal obliga on / license etc. viii. Behavior : Adverse effect on quality of work life? E. Submit ‘Report’ to management with recommenda on
  • 48. 7 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC P2.System / Requirement Analysis A. Informa on Collec on (Fact Finding Technique) i. Collec on of Documents ii. Interviews iii. Ques onnaires iv. Observa ons B. Analysis of current system i. History of organiza on ii. Data file maintain iii. Inputs iv. Method / Procedures v. Output vi. Internal Controls + Documenta on for following Two: i. Modeling of exis ng logical & physical system ii. Undertake overall analysis of Current system C. Analysis of Proposed system Therefore, Problem in Current system + New Req. in Proposed System = Specifica ons i.e. Specifica ons for Proposed System: For input, method/procedure, database, output, workload & me efficiency. D. Repor ng – SRS – System Requirement Specifica ons a. Introduc on - b. Informa on Descrip on (for input / output) – Informa on content requirement c. Func onal Descrip on (Process / Database) – all func on parameters d. Behavioral Descrip on (Controls) – Connec vity to External & Internal Org. e. Valida on Descrip on (Controls) – Tests to be formed f. Appendix – All tools of system development i.e. DFD, Flow chart etc. ---------- System Development Tools ---------- a. System flow & component For flow: i. Flow Chart – Physical flow of System ii. Data Flow Diagram – Logical flow of data within organiza on Four basic elements: 1. Data source & des na on, 2. Data Flows, 3. Processes 4. Data Stores For component : iii. Component Matrix Matrix framework to document resources used, ac vi es performed & informa on produced.
  • 49. 8 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC b. User interface i. Layout forms & screens They are used to construct the formats & contents of input / output media & methods ii. Dialog flow diagrams They are used to depict flow of dialogue between computer & people, based on response to menus & prompts. c. Data A ributes & Rela onship i. File Layout Forms Document type, size & name of data element in system ii. Data Dic onary Descrip on of informa on of data in files of IS (i.e. data about data, metadata) It contains – a) Name of the company file store data b) Codes of data item length / type / range c) Source documents used to create data d) Individual / program to permit access or not permi ed e) Name of the computer host programs that modify the data items iii. Gird charts Iden fying use of each type of data element iv. E-R Diagrams To document number & type of rela onship among the en es in a system d. Detailed system process i. Decision Tree Network / tabular form for decision ii. Decision Table To document complex condi onal logic involving among informa on processing alterna ves in system e. PDL (Program Design Language) / Pseudo code  Use of English language with syntax of structure of programming language  Benefit: English = convenience of ‘Spoken English Languages’ Structured Programming = To obtain Precision as programming. f. CASE Tools (Computer Aided So ware Engineering Tools)  These tools are used for the automa on of anything that ‘Human to do’ to develop the system / so ware.
  • 50. 9 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC Q - What are the characteris cs of Good system designs? Ans.: A. Capture all func onali es of the system – correctly B. Easy to understand C. Efficient design D. Flexible design E. Based on extensive analysis F. Flow prescribed standards of design G. Modular H. Directly relevant to business ac vi es P3.System Design A. Architectural Design B. Design of data / informa on flow C. Database Design i. Conceptual modeling: (Design) DBA design the database by E-R diagram & other tools It describes – applica on domain via. En ty, a ributes, sta c & dynamic constraints, rela onship among them. ii. Data modeling: (Readable by Program) Design prepared as above need to translate into data model so that it can be accessed & manipulated by high & low level PL. iii. Storage structure design (modeling): (How to store?) How linearize & par on the data structure as in data modeling to store on device. iv. Physical layout design (modeling): (Where to store?) How distributed the storage structure across specified storage device & loca ons like, tack, cylinder& sector on disk. D. Design of interface input & output 1. Format, 2. Content, 3. Form, 4. Timeliness, 5. Media, 6. Volume E. Physical Design F. Design of Acquisi on of Hardware / So ware P4.System Acquisi on & So ware Development A. Hardware Acquisi on B. So ware Acquisi on Benefit of Applica on packages i. Rapid implementa on ii. Low risk iii. High Quality iv. Low Cost
  • 51. 10 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC Limita on of Applica on packages: i. Lack of flexibility ii. Par ally useful applica on iii. Low quality of documents iv. Con nuity C. Contract & SW license D. Vendors’ proposal valida on Points to be considered for the valida on of proposal… i. Performance – CBA ii. Maintainability / Adaptability of each proposal iii. Compa bility with exis ng system iv. Support services by vendors E. Methods of valida on proposals i. Checklist: Most Common, Simple Method, List of required specifica on for HW/SW/ Support ii. Point scoring: Criteria with maximum points & allocate points based on performance iii. Evalua ng public report: Magazines & manuals for the same – Published Periodically iv. Bench marking test: Job mix of possible transac ons executed on acquiring system and then results will be compared with benchmark. F. So ware Development Characteris cs of good Program code: i. Reliabili es ii. Readability iii. Robustness – Strong enough (should not get hang out) iv. Accuracy v. Efficient vi. Usability Stages in so ware Development i. Program Analysis ii. Program Design iii. Program Coding iv. Debug the Program v. Program Documenta on vi. Program Maintenance Programming Language (PL):  Set of instruc on in programming language = Program code = source program  It is converted in Object Program (executable binary program) by Compiler.
  • 52. 11 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC  Debugging of So ware i. Complier Syntax / logical errors if any – check by complier while conver ng program ii. Structured Walk through Some me, there will be wrong business logic with correct syntax, so that, we need to check Object Program (Executable Program) as Structured walk through. iii. Test Finally, tes ng of whole so ware is done by test data to find ‘Run Time Errors’. P5.Tes ng Phase A. Unit Tes ng i. Func onal Tes ng : Process/func on – correct supposed to be ii. Performance Tes ng : Avg. response me iii. Stress Tes ng : Maximum load a system can handle (Users simultaneous access) iv. Structural Tes ng : Internal logic of programs v. Parallel Tes ng : same data for old & new – compare results from both Types of Unit Tes ng – Sta c (Non Execu on) i. Desk Check: by Programmer himself ii. Structured Walk Through: by other programmers through the text of program iii. Code Inspec on: reviewed by a formal commi ee with formal checklists. Dynamic (Execu on) i. Black Box Tes ng: External Perspec ve – no relevance with internal codes Test designer selects valid & invalid inputs & determines the correct output ii. White Box Tes ng: Internal Perspec ve – need to test whole system & codes Need to ensure internal opera on of the product conforms to specifica ons & all internal components are adequately exercised. iii. Gray Box Tes ng: Combina on = Black + White (i.e. based on Modules) B. Integra on Tes ng i. Bo om Up Tes ng – Tradi onal strategy ii. Top Down Tes ng iii. Regression Tes ng (when new Module introduced) C. System Tes ng i. Recovery ii. Security iii. Stress iv. Performance
  • 53. 12 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC D. Final Acceptance i. Quality Assurance Test ii. User Acceptance Test a. Alpha Test – α – By internal Staff b. Beta Test – β – By External Expert P6.System Implementa on A. Equipment installa on i. Site prepara on ii. Install iii. Check B. Training i. System Operators ii. User training C. Conversion i. Procedure conversion ii. File conversion iii. System conversion a. Direct conversion : Immediately change system from next day b. Parallel conversion : Old system con nue un l new system work properly c. Modular conversion : Start to change system module wise d. Pilot conversion : Change system at one loca on, than at all. iv. Scheduling conversion v. Alterna ve conversion P7. System Implementa on A. PIR – Post Implementa on Review (PIR) Did we get what we have set out to do in terms of business? (If No, than now, what should we need to do?) For That - DOI Evalua on Required… i. Development Evalua on ii. Opera on Evalua on iii. Informa on Evalua on B. Maintenance – i. Schedule Maintenance: An cipated & planned for opera onal con nuity & avoidance of an cipated risk ii. Rescue Maintenance: Previously non-detected malfunc ons that were not an cipated but require immediate troubleshoo ng solu on
  • 54. 13 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 5 – System Development Life Cycle (SDLC) Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 5 : SDLC iii. Correc ve Maintenance: Fixing bugs in code/defects found during the execu ons (ini ated by bug report & drawn up by end user) iv. Adop ve Maintenance: Adap ng so ware to changes in environment, such as hardware/OS v. Perfec ve Maintenance: The system runs sa sfactorily, but for accommoda ng to new/changed user requirement & ac vi es to increase performance. vi. Preven ve Maintenance: Ac vi es aimed at increasing system maintainability & improving modular structure of system. C. Opera onal Manual It is typical user’s guide, also commonly known as Opera ons Manual. The sec on of an opera on manual will include the following: 1) A cover page, a tle page and copyright page; 2) A preface, containing details of related documents and informa on on how to navigate the user guide; 3) A contents page; 4) A guide on how to use at least the main func ons of the system; 5) A troubleshoo ng sec on detailing possible errors or problems that may occur, along with how to fix them; 6) A FAQ (Frequently Asked Ques ons); 7) Where to find further help, and contact details; 8) A glossary and, for larger documents, an index. D. Auditor’s Role in SDLC:  The audit of systems under development can have three main objec ves.  It is primarily aimed to provide an opinion on the efficiency, effec veness, and economy of project management.  An auditor’s role is to assess the extent to which the system being developed provides for adequate audit trails and controls to ensure the integrity of data processed and stored; and the effec veness of controls being enacted for the management of the system's opera on.  In order to achieve these goals, an auditor has to a end project and steering commi ee mee ngs and examine project control documenta on and conduc ng interviews. ---- XXXX ---- XXXX ----
  • 55. 1 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 6 – Audi ng of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 6 : Auditing of ISs 1. What are needs of audit of informa on system? Ans.: Due to absence of control, following results may be there… A. Organiza onal costs of data loss B. Cost of computer abuse C. Incorrect Decision Making cost D. Loss of value of Hardware, So ware & personnel E. High cost of computer errors F. Maintenance of privacy may compromise G. Due to control – we can evaluate the use of computer 2. What are the Objec ves of IS Audit? Ans.: (Sieeeeee) (Safeguard, Integrity, Effec veness & Efficiency) A. Improve data security & safeguard of the assets B. Improve data integrity C. System effec veness objec ves – Improve Performance D. System efficiency objec ves – Reputa on & Customer Loyalty 3. Explain – Effects of computers on audit Ans.: For evidence collec on (for Audit Purpose)– A. Absence of input documents B. Lack of visible output C. Lack of visible output trail D. Data reten on & storage E. Audit evidence – system generated F. Legal issues For evidence evalua on (for Audit Purpose)– A. System generated transac on (due to backend processing) B. System errors (Systema c Errors – Coding Errors) 4. Who is responsible for implemen ng the controls in organiza on? Ans.: Responsible = Management A. Develop & implement ‘Cost Effec ve Internal Control (IC)’ B. Assess adequacy of IC in programs & opera ons C. Separately assess adequacy of IC over IS in consistent with security policy D. Iden fy the need & improvements E. Take – corresponding correc ve ac ons F. Report annually on IC through management assurance statement
  • 56. 2 | P a g e VR Talsaniya; (+91) 8671866086 Chapter 6 – Audi ng of Informa on Systems Contact : (+91) 8671866086 Email : ca.vrtalsaniya@gmail.com Slide-share : VR Talsaniya VR Talsaniya (CA. Vijay R. Talsaniya) Fast Track Notes Chapter – 6 : Auditing of ISs 5. What auditor needs to do? Ans.: Responsibility of auditor: A. Validate the implemented IC B. Also provide recommenda ons for improvements in IC (if any). 6. What are the ‘Set of skills’ expected from the IS Auditor? Ans.: A. Knowledge of business prac ces & compliance B. Knowledge of IT policy or security policy C. Knowledge of professional standards & best prac ces D. Adequate – Professional Technical qualifica on E. Ability to Understand – Technical controls F. Understanding of IS Risks & Controls 7. What are the Categories of IS Audit / Types of IS Audit / Area required to be audited in the IS Audit? Ans.: A. System (Opera on System) & Applica on B. Informa on processing facili es C. System Development (SD) D. Management of IT & enterprise architecture E. Telecommunica on, intranets & extranets. 8. What are the steps of IT Audit? Ans.: A. Scoping & Pre-audit survey - Scope B. Planning & Prepara on - Plan C. Audit & Field Work - Fieldwork D. Analysis - Analysis E. Audit Repor ng - Report F. Closure Notes – Closure 9. Factors / cri cal factors should be considered in preliminary review by IS Auditor Ans.: A. Knowledge of the business B. Understanding of the technology C. Understanding of IC System D. Legal considera on & audit standards E. Risk Assessment (RA) & Materiality (i.e. Inherent Risk, control Risk, Detec on Risk & Material or not?)