You are on page 1of 40

Revision 299

REVISION
CHAPTER 1 : CONCEPTS OF GOVERNANCE AND MANAGEMENT OF INFORMATION SYSTEMS

300
KEY CONCEPTS OF BENEFITS OF GOVERNANCE : (Afterwards Deffy and I GOVERNANCE
GOVERNANCE Provided Improvised Decision) DIMENSIONS
● Governance 1. Achieving enterprise objectives ● Conformance or Corporate

● Enterprise Governance 2. Defining and encouraging desirable behaviour in the use of IT Governance Dimension
● Corporate Governance 3. Implementing and integrating the desired business processes ● Performance or Business

4. Providing stability Governance Dimension


5. Improving customer, business and internal relationships
6. Enabling effective and strategically aligned decision making for
the IT

BENEFITS OF IT KEY PRACTICES TO BENEFITS OF GEIT KEY GOVERNANCE


GOVERNANCE DETERMINE STATUS OF IT ● It provides a consistent PRACTICES OF GEIT :
● Increased value delivered GOVERNANCE approach. (Electronic Dance Music)
through enterprise IT ● Who makes directing, ● IT-related decisions are made 1. Evaluate the Governance
● Increased user satisfaction controlling and executing in line with the enterprise's System
● Improved agility decisions ? strategies and objectives. 2. Direct the Governance
● Better cost performance ● How the decisions are ● IT-related processes are System
● Improved management
made ? overseen effectively. 3. Monitor the Governance
● What information is required ● Compliance with legal and System
● IT becoming an enabler

● Improved transparency
to make the decisions ? regulatory requirements.
● What decision-making ● Governance requirements for
● Improved compliance

Information Systems Control and Audit


mechanisms are required ? board members are met.
● More optimal utilisation of
● How exceptions are
IT resources
handled ?
● How the governance results
are monitored and
improved ?
Revision
BEST PRACTICES OF CORPORATE GOVERNANCE : (SAIF INTERNAL CONTROLS : (MAP)
AND FARHAN CLEARLY EXERCISE IN GYM) The SEC's final rules define "internal control over financial
1. Special monitoring reporting" :
2. Appropriate information flows internally and to the public 1. Pertain to the maintenance of records
3. Financial and managerial incentives 2. Provide reasonable assurance that transactions are recorded as
4. Clear assignment of responsibilities necessary to permit preparation of financial statements
5. Establishment of a mechanism for the interaction and co- 3. Provide reasonable assurance regarding prevention of timely
operation among the board of directors, senior management detection of unauthorised acquisition, use, or disposition of the
and the auditors company's assets
6. Implementing strong internal control systems

INTERNAL CONTROLS AS IT STEERING COMMITTEE STRATEGIC PLANNING


PER COSO : (ERA of The role and responsibility of the IT Steering Committee : There are three levels of
Communalism was ● To ensure that long and short-range plans of the IT department managerial activity in an
Monitored) are in tune with enterprise goals and objectives enterprise :
1. Control Environment ● To establish size and scope of IT ● Strategic Planning

2. Risk Assessment ● To review and approve major IT deployment projects ● Management Control

3. Control Activities ● To approve and monitor key projects ● Operational Control


4. Information and ● To review the status of IS plans
Communication ● To review and approve standards, policies and procedures
5. Monitoring ● To make decisions on all key aspects of IT

● To facilitate implementation of IT security

● To facilitate and resolve conflicts in deployment of IT

● To report to the Board of Directors on IT activities on a regular

basis

IT strategy planning in an enterprise could be broadly classified into the following categories :
● Enterprise Strategic Plan

● Information Systems Strategic Plan

● Information Systems Requirements Plan

● Information Systems Applications and Facilities Plan

301
302
KEY MANAGEMENT PRACTICES FOR ALIGNING IT BUSINESS VALUE FROM SOURCES OF RISK : (Mainly
STRATEGY WITH ENTERPRISE STRATEGY : (U Are The USE OF IT : (Electronic Dance HNI Causes Political and
Greatest Show Conductor) Music) Economical Tension)
1. Understand enterprise direction 1. Evaluate Value Optimisation 1. Management activities and
2. Assess the current environment, capabilities and performance 2. Direct Value Optimisation controls
3. Define the target IT capabilities 3. Monitor Value Optimisation 2. Human behaviour
4. Conduct a gap analysis 3. Natural events
5. Define the strategic plan and road map 4. Individual activities
6. Communicate the IT strategy and direction 5. Commercial and Legal
relationships
6. Political circumstances
7. Economic circumstances
8. Technology and Technical
issues

RELATED TERMS
1. Asset : Asset can be defined as something of value to the organisation; e.g. information in electronic or physical form, software
systems, employees.
2. Vulnerability is the weakness in the system safeguards that exposes the system to threats.
3. Threat : Any entity, circumstance, or event with the potential to harm the software system or component through its unauthorised
access, destruction, modification, and / or denial of service is called a threat.
4. Likelihood : Likelihood of the threat occurring is the estimation of the probability that the threat will succeed in achieving an
undesirable event.
5. Attack : An attack is an attempt to gain unauthorised access to the system's services or to compromise the system's dependability.

Information Systems Control and Audit


These risks lead to a gap between the need to protect systems and the degree of protection applied. The gap is caused by:
● Widespread use of technology.

● Interconnectivity of systems.

● Elimination of distance, time and space as constraints.

● Unevenness of technological changes.

● Devolution of management and control.

● External factors such as legislative, legal and regulatory requirements or technological developments.

Countermeasure : An action, device, procedure, technique or other measure that reduces the vulnerability of a component or system is
referred as countermeasure.
Residual Risk: Any risk still remaining after the counter measures are analysed and implemented is called residual risk.
Revision
RISK MANAGEMENT KEY GOVERNANCE KEY MANAGEMENT KEY MANAGEMENT
STRATEGIES : (5T) PRACTICES OF RISK PRACTICES OF RISK PRACTICES OF IT
● Tolerate/Accept the risk MANAGEMENT : (Electronic MANAGEMENT : (CA and COMPLIANCE : (I Owe
● Terminate/Eliminate the Dance Music) MAD about Results) Company an Apology)
risk 1. Evaluate Risk Management 1. Collect Data 1. Identify external compliance
● Transfer/Share the risk 2. Direct Risk Management 2. Analyse Risk requirements
● Treat/Mitigate the risk 3. Monitor Risk Management 3. Maintain a Risk Profile 2. Optimise response to
● Turn back 4. Articulate Risk external requirements
5. Define a Risk Management 3. Confirm external compliance
Action Portfolio 4. Obtain assurance of external
6. Respond to Risk compliance

COBIT 5 - A GEIT CUSTOMISING COBIT AS FIVE PRINCIPLES OF COBIT COBIT 5 ENABLERS :


FRAMEWORK : NEED FOR PER NEED : (I Regularly Go 5 : (Municipal Corporation of (Principal Informs us about
ENTERPRISES TO USE and Ask For Leave) Ahmedabad Ensures Safety) the Organisation, Processes,
COBIT 5 1. Information security Principle 1 : Meeting Culture and Services rendered
1. Increased value creation 2. Risk management Stakeholder Needs to People)
from use of IT. 3. Governance and Principle 2 : Covering the 1. Principles, policies and
2. User satisfaction with IT management of enterprise IT Enterprise End-to-End frameworks
engagement and services. 4. Assurance activities Principle 3 : Applying a Single 2. Information
3. Reduced IT-related risks 5. Financial processing or CSR Integrated Framework 3. Organisational structures
and compliance with laws, reporting Principle 4 : Enabling a Holistic 4. Processes
regulations and contractual 6. Legislative and regulatory Approach 5. Culture, ethics and
requirements. compliance Principle 5 : Separating behaviour
4. The development of more Governance from Management 6. Services, infrastructure and
business-focused IT applications
solutions and services. 7. People, skills and
5. Increased enterprise wide competencies
involvement in IT-related
activities.

303
304
COMPONENTS OF COBIT 5: EVALUATING IT The key management practices for assessing and evaluating the
1. Control Objective GOVERNANCE STRUCTURE system of internal controls in an enterprise are given as follows :
2. Framework AND PRACTICES BY (Play Station Is Ensured to be Exchanged on MRP)
3. Process Descriptions INTERNAL AUDITORS : 1. Plan assurance initiatives
4. Management Guidelines (Organisational Leaders 2. Scope assurance initiatives
Perform to Process Risky 3. Identify and report control deficiencies
Controls)
4. Ensure that assurance providers are independent and qualified
1. Organisational Structure
5. Execute assurance initiatives
2. Leadership 6. Monitor internal controls
3. Performance Measurement/ 7. Review business process controls effectiveness
Monitoring
8. Perform control self-assessment
4. Processes
5. Risks
6. Controls

Information Systems Control and Audit


CHAPTER 2 : INFORMATION SYSTEMS CONCEPTS

Revision
CLASSIFICATION OF CHARACTERISTICS OF COMPONENT OF CHARACTERISTICS OF A
SYSTEM INFORMATION : (CAR has INFORMATION SYSTEM BUSINESS SYSTEM /
1. Elements MRF Tyres and Voice ● People COMPUTER-BASED
● Abstract System Recorder) ● Computer System INFORMATION SYSTEM
● Physical System 1. Completeness ● Data
(CBIS)
2. Cost Benefit Analysis ● All systems work for
2. Interactive Behaviour ● Network
3. Accuracy and Quality predetermined objectives
● Closed System
4. Relevance and Purpose ● No subsystem can function in
● Open System
5. Mode and Format isolation
● Relatively Closed System
● If one subsystem or
3. Degree of Human 6. Redundancy
component of a system fails,
Intervention 7. Frequency
then in most cases the whole
● Manual System 8. Timeliness
system does not work.
● Automated System 9. Validity
● The way a subsystem works
4. Working / Output 10. Reliability with another subsystem is
● Deterministic System called interaction.
● Probabilistic System ● The work done by an
individual subsystem is
MAJOR AREAS OF TYPES OF INFORMATION SYSTEMS integrated to achieve the
COMPUTER BASED ● Operational Level IS central goal of the system.
APPLICATIONS - Transaction Processing Systems (TPS)
1. Finance and Accounting ● Management Level IS
TRANSACTION
2. Marketing and Sales - Management Information Systems (MIS) PROCESSING SYSTEM (TPS)
3. Production and - Decision Support Systems (DSS) ● Capturing data to organize
Manufacturing ● Strategic Level IS in files or databases
4. Inventory / Stores - Executive Information Systems (EIS) ● Processing of files /
Management ● Knowledge Base IS databases
5. Human Resource - Knowledge Management Systems (KMS) ● Generating information
Management
- Office Automation Systems (OAS) ● Handling of queries from
various quarters of the
organization.

305
306
TPS COMPONENTS FEATURES OF TPS : (LABS) MANAGEMENT MISCONCEPTIONS ABOUT
● Inputs ● Large volume of data INFORMATION SYSTEM MIS
● Processing ● Automation of basic (MIS) ● Any computer based

● Storage operations Characteristics of an Effective information system is a MIS.


● Outputs ● Benefits are easily MIS : (MICS is a History) ● Any reporting system is MIS.

measurable 1. Management Oriented ● MIS is a management

● Source of input for other 2. Management Directed technique.


systems 3. Integrated ● MIS is a bunch of

4. Common Database technologies.


5. Computerised ● It is a file structure.

6. Sub system concept ● The study of MIS is about

7. Heavy Planning Element use of computers.


● More data is generated
reports refers more
information to managers.
● Accuracy plays vital role in
reporting.

PRE-REQUISITES OF AN CONSTRAINS IN LIMITATIONS OF THE MANAGEMENT INFORMATION


MIS : (D - CESS) OPERATING A MIS : SYSTEM : (LIMITATION)
1. Database (QUEST) 1. Less useful for unstructured data
2. Control and Maintenance of 1. Qualified staff not available 2. Internal information is taken into consideration
MIS 2. Quantifying the benefits of 3. Management keeps changing so does their goals
3. Evaluation of MIS MIS is difficult

Information Systems Control and Audit


4. Inputs and processing quality determines the quality of outputs
4. System and Management 3. Expert’s turnover is high of MIS
Staff should be qualified 4. Selection of Sub system of 5. Transaction processing system’s limitations still exist in MIS
5. Support of Top Management MIS 6. Ad-hoc reporting is not possible
5. Standardised approach not 7. The Attitudes and moral (non-quantitative factors) are ignored
possible in MIS
6. Staff’s Cooperation not 8. Integration is lacking
available 9. Hoarding of information and not sharing with others exists and
hence reduces the effectiveness of MIS
10. Not a substitute for effective management.
Revision
CHARACTERISTICS OF DSS COMPONENTS OF A DSS EXAMPLES OF DSS IN
1. This supports decision making ● The User ACCOUNTING
2. It should be able to help group making decisions. ● Databases 1. Cost Accounting System
3. It should be flexible ● A planning language 2. Capital Budgeting System
4. DSS focuses on decision rather than data and information. ● Model Base 3. Budget Variance Analysis
5. It should be easy to use. System
6. DSS can be used for structured problems. 4. General Decision Support
7. DSS should be user-friendly. System
8. DSS should be extensible and evolve overtime.
9. DSSs are used mainly for decision making rather than
communicating decisions and training purposes.
10. The impact of DSS should be on decision where the manager's
judgement is essential

CHARACTERISTICS OF EIS CHARACTERISTICS OF THE TYPES OF INFORMATION


● EIS is a Computer-based-information system USED IN EXECUTIVE DECISION-MAKING : (SUFI Level)
● EIS enables users to extract summary data 1. Structure is lacking
● EIS provides rapid access to timely information 2. High degree of Uncertainty
● EIS is capable of accessing both internal and external data 3. Future orientation
● EIS provides extensive online analysis tool 4. Informal source
● EIS can easily be given a DSS support for decision making 5. Low Level of detail

PRINCIPLES TO BE FOLLOWED WHILE DESIGNING AN EIS KNOWLEDGE


● Easy to understand and collect. MANAGEMENT SYSTEMS
● Based on a balanced view of the organisation’s objectives. (KMS)
● Reflecting everyone’s contribution in a fair and consistent way. Types of Knowledge
● Encouraging for the management and staff to share ownership of the organisation’s objectives. ● Explicit Knowledge

● Available to everyone in the organization. ● Tacit Knowledge

● Evolving to meet the changing needs of the organization.

307
308
Different office activities can be broadly grouped into the BENEFITS OF OFFICE CATEGORIES OF
following types of operations: (Files are Created, Captured, AUTOMATION SYSTEMS COMPUTER BASED OFFICE
Calculated & Recorded before Distribution) (i)Improve communication AUTOMATION SYSTEMS
● Filling, Search, Retrieval and Follow up (ii) Reduce the cycle time 1. Text Processing Systems
● Document Creation (iii) Reduce the costs 2. Electronic Document
● Document Capture (iv) Ensure accuracy Management Systems
● Calculations 3. Electronic Message
● Recording Utilization of Resources Communication Systems
● Receipts and Distribution 4. Teleconferencing and Video-
conferencing Systems

BUSINESS APPLICATIONS BENEFITS OF EXPERT SYSTEMS The Properties That Potential


OF EXPERT SYSTEM (i) Expert Systems preserve knowledge Applications Should Posses to
1. Accounting and Finance (ii) Expert Systems put information into an active-form Qualify For Expert System
2. Marketing (iii) Expert Systems assist novices in thinking Development are : (Due to
3. Manufacturing Domain Structure Complexity
(iv) Expert Systems are not subject to such human fallings
Expertise is Available)
4. Personnel (v) Expert Systems can be effectively used as a strategic tool
(i) Domain
5. General Business
(ii) Structure
(iii) Complexity
(iv) Expertise
(v) Availability

Information Systems Control and Audit


ENTERPRISE RESOURCE PLANNING (ERP) B. Benefits of ERP
A. Components of ERP/Methodology for Implementing ERP ● Streamline processes into single integrated system.
Model ● Improves workflow and efficiency.
● Software ● Reduced duplication in data entry.
● Process Flow ● Establish uniform process for sharing information.

● Customer Mindset ● Inventory - Reduced inventory cost from better planning.

● Change Management ● Improved customer satisfaction.

● Faster collection based on better visibly of accounts.

● Prepares consolidated picture for organisation.


Revision
CORE BANKING SYSTEM (CBS) Information systems perform To operate information
Elements of CBS: following three vital roles in systems (IS) effectively and
(a) Opening a new account business firms : efficiently a business manager
(b) Process cash deposit and withdrawl 1. "Support an organization's should have following
(c) Processing payments and cheques business processes and knowledge about it :
(d) Making loans operations" ● Foundation Concepts

(e) Calculating interest 2. "Support business decision- ● Information Technologies


making" (IT)
(f) Managing CRM
3. "Support Strategic ● Business Applications
(g) Establishing minimum balance criteria
Competitive Advantage" ● Development Processes
(h) Maintaining records of all activities
● Management Challenges

INFORMATION SYSTEM AND ITS ROLE IN The impact of IT on information systems for different sectors is
MANAGEMENT explained below :
● Aids in decision-making 1. E-business
● Gain competitive edge 2. Financial Service Sector
● Innovative ideas 3. Wholesaling and Retailing
● Knowledge 4. Public Sectors
● It can be integrated to formulate a strategy of action or 5. Others
operation

309
CHAPTER 3 : PROTECTION OF INFORMATION ASSETS

310
SECURITY OBJECTIVE WHAT INFORMATION IS TOOLS TO IMPLEMENT ISSUES TO ADDRESS
● Confidentiality SENSITIVE ? POLICY ● A definition of information
● Integrity ● Strategic Plans Standards, Guidelines and security.
● Availability ● Business Operations Procedures ● Reasons why information

● Finances security.
● A brief explanation of the

MEMBERS OF SECURITY TYPES OF INFORMATION SECURITY POLICIES AND THEIR security policies, principles,
POLICY HIERARCHY : (U And I Can Obviously Nail It) standards and compliance
● Management members 1. User Security Policy requirements.
● Definition of all relevant
● Technical group 2. Acceptable Usage Policy
information security
● Legal experts 3. Information Security Policy
responsibilities.
4. Conditions of Connection
● Reference to supporting
5. Organisational Information Security Policy
documentation.
6. Network and System Security Policy
7. Information Classification Policy

EFFECT OF COMPUTERS Internal Controls used within BASED ON OBJECTIVE Another Classification of
ON INTERNAL an Organisation comprise of 1. Preventive Controls Controls is based on the
CONTROLS : (RAM’S the following five Interrelated 2. Detective Control Nature of such Controls with
Personal Assistant) Components : (Environment 3. Corrective Controls regard to the Nature of IS
● Record keeping Information Requires Resources to which they are
4. Compensatory Controls

Information Systems Control and Audit


● Access to assets and records Monitoring Activities) applied :
● Management supervision ● Control Environment (i) Environmental Controls
and review ● Information and (ii) Physical Access Controls
● Segregation of duties Communication (iii) Logical Access Controls
● Personnel ● Risk Assessment

● Authorisation procedures ● Monitoring

● Control Activities
Revision
BASED ON AUDIT INFORMATION ACCESS CONTROL LOGICAL ACCESS PATHS :
FUNCTION CLASSIFICATION : (TCP/IP) MECHANISMS (D BOOT)
(a) Managerial Control ● Top Secret 1. Identification 1. Dial-up Ports
(b) Application Control ● Highly Confidential 2. Authentication 2. Online Terminals
● Proprietary 3. Authorisation 3. Operator Console
● Internal Use only 4. Telecommunication Network
● Public Documents

TECHNICAL EXPOSURES ASYNCHRONOUS COMPUTER CRIME USER CONTROLS


(TECHNICAL RISKS) : ATTACKS : (Pig LTD) EXPOSURES : (Free DISCS) 1. Boundary Control
(Worms Destroyed D Horse (a) Piggybacking (a) Financial Loss 2. Input Control
by Throwing Bombs) (b) Data Leakage (b) Legal Repercussions 3. Processing Control
(a) Worms (c) Wire-Tapping (c) Disclosure of Confidential, 4. Output Control
(b) Data Diddling (d) Shut Down of the Sensitive or Embarrassing 5. Database Control
(c) Rounding Down Computer/Denial of Information 6. Communication Control
(d) Trojan Horse Service (d) Industrial Espionage/
(e) Salami Techniques Blackmail
(f) Bombs (e) Sabotage
(f) Loss of Credibility/
Competitive Edge
(g) Spoofing

BOUNDARY CONTROL INPUT CONTROLS (b) Data Coding Controls (c) Validation Controls
TECHNIQUES ARE (a) Source Document Controls ● Transcription Errors ● Field interrogation
● Personal Identification ● Use pre-numbered source - Addition ● Record interrogation
Numbers (PIN) document - Truncation ● File interrogation
● Passwords ● Use source documents in - Substitution
● Cryptography sequence ● Transposition Errors
● Identification Cards ● Periodically audit source - Single transposition
● Biometric Devices documents - Multiple transposition

311
312
FIELD INTERROGATION RECORD INTERROGATION FILE INTERROGATION PROCESSING CONTROLS
● Limit Check ● Reasonableness Check ● Version Usage 1. Processor Control
● Picture Check ● Valid Sign ● Internal and External (i) Error detection and
● Valid Code Checks ● Sequence Check Labeling correction
● Check Digit ● Data File Security (ii) Multiple execution states
● Arithmetic Checks ● Before and after Image and (iii) Timing controls
● Cross Checks Logging (iv) Component replication
● File Updating and 2. Real Memory Control
Maintenance Authorisation 3. Virtual Memory Control
● Parity Check 4. Data Processing Control :
(REFER)
OUTPUT CONTROLS : DATABASE CONTROLS COMMUNICATION ● Run-to-run totals
(Spoon and Log Require The update controls are: CONTROL ● Edit checks
Retaining, Storing, Reporting ● Sequence Check Transaction (a) Physical Component ● Field initialization
& Printing) and Master Files Control ● Exception reports
● Spooling/Queuing ● Ensure All Records on Files (b) Line Error Control ● Reasonableness verification
● Logging of output program are processed (c) Flow Control ● Existence and Recovery
executions ● Process multiple transactions (d) Link Control Control
● Recovery Controls for a single record in the (e) Topology Control
● Retention controls correct order (f) Internet Working Control
● Storage of sensitive critical ● Maintain a suspense account

forms The Report controls are: MANAGERIAL CONTROLS


● Report distribution and (Standard Print Recovery) 1. Top Management and Information Systems Management

Information Systems Control and Audit


collection controls ● Standing Data Controls
● Printing Controls ● Print Run-to-Run control 2. Systems Development Management Controls
Totals 3. Programming Management Controls
● Print Suspense Account
4. Data Resource Management Controls
Entries
5. Quality Assurance Management Controls
● Existence/Recovery Controls
6. Security Management Controls
7. Operations Management Controls
Revision
DATA INTEGRITY : (SID is DATA INTEGRITY DATA SECURITY
on the POT) POLICIES An IS auditor is responsible to evaluate the following when
● Source data control ● Virus-Signature Updating reviewing the adequacy of data security controls:
● Input validation routines ● Software Testing ● Who is responsible for the accuracy of the data?

● On-line Data Entry Controls ● Division of Environments ● Who is permitted to update data?

● Data Processing and Storage ● Offsite Backup Storage ● Who is permitted to read and use the data?

Controls ● Quarter-End and Year-End ● Who is responsible for determining who can read and update

● Output Controls Backups the data?


● Data Transmission Controls ● Disaster Recovery ● Who controls the security of the data?

● If the IS system is outsourced, what security controls and


protection mechanism does the vendor have in place to secure
and protect data?
● Contractually, what penalties or remedies are in place to protect
the tangible and intangible values of the information?

FINANCIAL CONTROL PERSONAL COMPUTERS CONTROL


TECHNIQUES CONTROLS The Security Measures that could be exercised to overcome these
● Authorization Related risks aforementioned risks are given as follows :
● Budgets ● Easy to connect and ● Physically locking the system

● Cancellation of documents disconnect ● Proper logging of equipment shifting must be done

● Documentation ● Pen drives can be very ● Centralised purchase of hardware and software

● Dual control conveniently transported ● Standards set for developing, testing and documenting

● Input/ output verification ● Does not provide inherent ● Uses of antimalware software

● Supervisory review
data safeguards ● The use of personal computer and their peripheral must be
● Segregation of duty is not controls.
possible
● The staff mobility is higher

● The operating staff may not

be adequately trained

313
314
REMOTE AND DISTRIBUTED DATA PROCESSING APPLICATIONS CAN BE CONTROLLED IN MANY WAYS
● Remote access to computer and data files through the network should be implemented.

● Having a terminal lock

● Applications that can be remotely accessed via modems and other devices should be controlled appropriately.

● Terminal and computer operations at remote locations should be monitored carefully and frequently.

● There should be proper control mechanisms over system documentation and manuals.

● Data transmission over remote locations should be controlled.

● When replicated copies of files exist at multiple locations it must be ensured that all are identical copies contain the same information

and checks are also done to ensure that duplicate data does not exist.

LOGICAL ACCESS CONTROL ACROSS THE SYSTEM PHYSICAL ACCESS ISSUES AND EXPOSURES
● User access management The following points elucidate the results due to accidental or
● User responsibilities intentional violation of the access paths:
● Network access control ● Abuse of data processing resources.

● Operating system access control ● Blackmail

● Application and monitoring system access control ● Embezzlement

● Mobile computing ● Damage, vandalism or theft to equipments or documents.

● Modification of semester equipment and information.

● Public disclosure of sensitive information.

● Unauthenticated entry

Information Systems Control and Audit


Revision
PHYSICAL ACCESS CONTROLS FOR CYBER FRAUDS CYBER ATTACKS
CONTROLS ENVIRONMENTAL Two types : The major cyber-attacks during
1. Locks on Doors EXPOSURES ● Pure Cyber Frauds the year 2011 are discussed as
● Cipher locks ● Hand-Held Fire ● Cyber Enabled Frauds follows :
(Combination Door Locks) Extinguishers ● Phishing

● Bolting Door Locks ● Manual Fire Alarms ● Network Scanning

● Electronic Door Locks ● Fire Suppression Systems ● Virus/Malicious Code


IMPACT OF CYBER FRAUDS
● Biometric Door Locks - Dry-Pipe sprinkling ON ENTERPRISES ● Spam

2. Physical identification systems ● Financial Loss ● Website Compromise /


medium - Water based systems ● Legal Repercussions
Malware Propagation
● Personal Identification - Halon systems ● Loss of Credibility or
● Others

numbers (PIN) ● Regular Inspection by Fire


Competitive Edge - Cracking
● Plastic Cards Department ● Disclosure of Confidential, - Eavesdropping
● Cryptographic Control ● Water Detectors - E-mail Forgery
Sensitive or Embarrassing
● Identification Badges ● Smoke Detectors Information - E-mail Threats
3. Logging on utilities ● Strategically Locating the ● Sabotage - Scavenging
● Manual Logging Computer Room
● Electronic Logging ● Fireproof Walls, Floors and TECHNIQUES TO COMMIT CYBER FRAUDS
4. Other means of controlling Ceilings surrounding the 1. Hacking
Physical Access Computer Room
2. Cracking
● Electrical Surge Protectors
● Video Cameras 3. Data Diddling
● Uninterruptible Power
● Security Guards 4. Data Leakage
Supply (UPS) / Generator
● Controlled Visitor Access 5. Denial of Service (DoS) Attack
● Power Leads from Two
● Bonded Personnel 6. Internet Terrorism
Substations
● Dead man Doors 7. Logic Time Bombs
● Emergency Power-Off Switch
● Non–exposure of 8. Masquerading or Impersonation
● Wiring Placed in Electrical
Sensitive Facilities 9. Password Cracking
Panels and Conduit
● Computer Terminal 10. Piggybacking
● Prohibitions against Eating,
Locks 11. Round Down
Drinking and Smoking
● Controlled Single Entry
within the Information 12. Scavenging or Dumpster Diving
Point
Processing Facility 13. Social Engineering Techniques
● Alarm System
● Documented and Tested 14. Super Zapping
● Perimeter Fencing
Emergency Evacuation Plans

315
15. Trap Door
CHAPTER 4 : BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING

316
NEED FOR BUSINESS ADVANTAGE OF BUSINESS BCM POLICY BUSINESS CONTINUITY
CONTINUITY CONTINUITY The objective of this policy is to PLANNING
MANAGEMENT (BCM) 1. is able to proactively assess provide a structure through Business continuity covers the
Some key terms related to the threat scenario and which: following areas:
BCM : potential risks; ● Critical services and activities ● Business resumption

1. Business Contingency 2. has planned response to undertaken by the enterprise planning


2. BCP Process disruptions which can operation for the customer ● Disaster recovery planning

3. Business Continuity contain the damage and will be identified. ● Crisis management
Planning (BCP) minimize the impact on the ● Plans will be developed to
enterprise; and ensure continuity of key
3. is able to demonstrate a service delivery.
response through a process ● Invocation of incident
of regular testing and management and business
trainings. continuity plans can be PHASES OF BUSINESS
managed. CONTINUITY PLANNING :
OBJECTIVES AND GOALS OF BUSINESS CONTINUITY ● Incident Management Plans (Pakistan Vs Bangladesh
PLANNING and Business Continuity Delayed Playing Their Match
The key objectives of the contingency plan should be to: Plans are subject to ongoing In India)
● Provide for the safety and well-being of people on the premises testing, revision and The eight phases are described
at the time of disaster. updation as required. in detail in the following:
● Continue critical business operations. ● Planning and management 1. Pre-Planning Activities
● Minimise the duration of a serious disruption. responsibility are assigned to 2. Vulnerability Assessment

Information Systems Control and Audit


● Minimise immediate damage and losses. a member of the relevant and General Definition of
● Establish management succession and emergency powers. senior management team. Requirements
● Identify critical lines of business and supporting functions. 3. Business Impact Analysis
The goals of the business continuity plan should be to: 4. Detailed Definition of
● Identify weaknesses and implement a disaster prevention Requirements
program. 5. Plan Development
● Minimise the duration of a serious disruption to business 6. Testing Program
operations. 7. Maintenance Program
● Facilitate effective co-ordination of recovery tasks. 8. Initial Plan Testing and Plan
● Reduce the complexity of the recovery effort. Implementation
Revision
COMPONENTS OF BCM BCM DOCUMENTATION BUSINESS IMPACT BCM TESTING
PROCESS AND RECORDS ANALYSIS (BIA) In case of Development of BCP,
● BCM - Management Process The following documents For each activity supporting the the objectives of performing
● BCM - Information (representative only) are delivery of key products and BCP tests are to ensure that:
Collection Process classified as being part of the services within the scope of its ● The recovery procedures are

● BCM - Strategy Process business continuity BCM program, the enterprise complete and workable.
● BCM - Development and
management system : should : ● The competence of personnel

Implementation Process ● The business continuity ● assess the impacts that would in their performance of
● BCM Testing and
policy; occur if the activity was recovery procedures can be
Maintenance Process ● The business continuity disrupted over a period of evaluated.
management system; time; ● The resources such as
● BCM Training Process
● The business impact analysis ● identify the maximum time business processes, IS
report; period after the start of a systems, personnel, facilities
● The risk assessment report; disruption within which the and data are obtainable.
● The aims and objectives of
activity needs to be resumed; ● The manual recovery

each function; ● identify critical business procedures and IT backup


● The activities undertaken by
processes; system/s are current and can
each function; ● assess the minimum level at either be operational or
● The business continuity
which the activity needs to be restored.
strategies; performed on its resumption; ● The success or failure of the
● identify the length of time business continuity training
● The overall and specific

incident management plans; within which normal levels program is monitored.


● The business continuity
of operation need to be
plans; resumed; and
● identify any inter-dependent
● Change control, preventative
activities, assets, supporting
action, corrective action,
document control and record infrastructure or resources
control processes; that have also to be
maintained continuously or
● Local Authority Risk
recovered over time.
Register;
● Exercise schedule and
results;
● Incident log; and

● Training program.

317
318
MAINTENANCE PROGRAM REVIEWING BCM ARRANGEMENT
● Determine the ownership and responsibility. An audit or self-assessment of the enterprise's BCM program
● Identify the BCP maintenance triggers to ensure that any should verify that :
organisational, operational, and structural changes are ● All key products and services and their supporting critical

communicated to the personnel. activities and resources have been identified


● Determine the maintenance regime to ensure the plan remains ● The enterprise's BCM policy, strategies, framework and plans

up-to-date. accurately reflect its priorities


● Determine the maintenance processes to update the plan. ● The enterprise's BCM competence

● Implement version control procedures to ensure that the plan is ● The enterprise's BCM solutions are effective

maintained up-to-date. ● The enterprise's BCM maintenance and exercising programs

● BCM strategies and plans incorporate improvements

● The enterprises has an ongoing program for BCM training and


awarenss
● BCM procedures have been effectively communicated to

relevant staff
● Change control processes are in place and operate effectively

TRAINING, AWARENESS AND COMPETENCY TYPES OF PLANS : (Boys SOFTWARE AND DATA
● Actively listens to others, their ideas, views and opinions; Entered the Room) BACK-UP TECHNIQUES -
● Provides support in difficult or challenging circumstances; 1. Back-up Plan TYPES OF BACK-UPS : (I
● Responds constructively to difficult circumstances; 2. Emergency Plan Managed to Draw a Flower)
● Adapts leadership style appropriately to match the 3. Recovery Plan 1. Incremental Backup
circumstances; 4. Test Plan 2. Mirror back-up

Information Systems Control and Audit


● Promotes and positive culture of health, safety and the 3. Differential Backup
environment; 4. Full Backup
● Recognizes and acknowledges the contribution of colleagues;

● Encourages the taking of calculated risks; ALTERNATE PROCESSING FACILITY ARRANGEMENTS


● Encourages and actively responds to new ideas; ● Cold site

● Consults and involves team members to resolve problems; ● Hot site

● Demonstrates personal integrity; and ● Warm site

● Challenges established ways of doing things to identify ● Reciprocal agreement:

improvement opportunities. ● Third party site


Revision
DISASTER RECOVERY PROCEDURAL PLAN AUDIT OF THE DISASTER RECOVERY / BUSINESS
● The conditions for activating the plans RESUMPTION PLAN
● Emergency procedures 1. Determine if a disaster recovery plan exists
● Fallback procedures 2. Determine if resources have been made available to maintain
● Resumption procedures the disaster recovery/business resumption plan and keep it
● A maintenance schedule
current.
● Awareness and education activities
3. Gain an understanding of the methodology used to develop the
● The responsibilities of individuals
existing disaster recovery/business resumption plan.
4. Interview functional area managers or key employees to
● Contingency plan document distribution list.
determine their understanding of the disaster recovery/
● Detailed description of the purpose and scope of the plan.
business resumption plan.
● Contingency plan testing and recovery procedure.
5. Is there a designated emergency operations center where
● List of vendors doing business with the organisation
incident management teams can co-ordinate response and
● Checklist for inventory
recovery ?
● List of phone numbers of employees
6. Does the disaster recovery/business resumption plan include
● Emergency phone list for fire, police, hardware, software, the names and numbers of suppliers of essential equipment and
suppliers other material ?
● Medical procedure to be followed in case of injury. 7. Determine if the plan includes prioritisation of critical
● Back-up location contractual agreement applications and systems.
● Insurance papers and claim forms. 8. Determine if the plan includes time requirements for recovery/
● Primary computer centre hardware, software, peripheral availability of each critical system.
equipment 9. Review information backup procedures in general.
● Location of data and program files 10. Determine if information backup procedures are sufficient to
● Alternate manual procedures to be followed such as allow for recovery of critical data.
preparation of invoices. 11. Review any agreements for use of backup files.
● Names of employees trained for emergency situation 12. Verify that the backup facilities are adequate based on projected
● Details of airlines, hotels and transport arrangements. needs.

319
CHAPTER 5 : ACQUISITION, DEVELOPMENT AND IMPLEMENTATION

320
OF INFORMATION SYSTEMS

Information Systems Control and Audit


Revision 321
322
SYSTEMS DEVELOPMENT PROCESS: REASONS FOR FAILURE: THE CHARACTERISTICS OF SYSTEM
Systems development refers to the process ● Lack of senior management support for DEVELOPMENT METHODOLOGY:
of examining a business situation with the and involvement in information systems ● The project is divided into a number of
intent of improving it through better development identifiable processes
procedures and methods. ● Shifting user needs ● Deliverables must be produced
● System Analysis ● Development of strategic systems ● Users, managers, and auditors are
● System Design ● New technologies required to participate in the project to
● Lack of standard project management provide sign-offs.
and systems development ● The system must be tested thoroughly

methodologies ● A training plan is developed

● Overworked or under-trained ● Formal program change controls are

development staff established


● Resistance to change ● A post-implementation review of all

● Lack of user participation developed systems must be performed


● Inadequate testing and user training

APPROACHES TO SYSTEM SYSTEM DEVELOPMENT LIFE CYCLE THE PHASES INVOLVED IN THE
DEVELOPMENT (SDLC): framework provides system SDLC: (I Require A Design Developer To
● Waterfall: Linear framework type designers and developers to follow a Implement and Maintain)
● Prototyping: Iterative framework type sequence of activities. It consists of a set of ● Preliminary Investigation

● Incremental: Combination of linear and


steps or phases in which each phase of the ● Systems Requirements Analysis

iterative framework type SDLC uses the results of the previous one. ● Systems Design

● Spiral: Combination linear and iterative ● Systems Acquisition & Development

Information Systems Control and Audit


framework type ● Systems Testing
● Rapid Application Development (RAD): ● Systems Implementation
Iterative Framework Type ● Post Implementation Review and
● Agile Methodologies Maintenance
Revision
STAGE - I : PRELIMINARY 1. IDENTIFICATION OF PROBLEM 3. DELINEATION OF SCOPE
INVESTIGATION - OBJECTIVES ● Clarify and understand the project ● Functionality requirements

Objective: request ● Data to be processed


To determine and analyze the strategic ● Determine the size of the project ● Control requirements
benefits in implementing the system ● Determine the technical and operational ● Performance requirements
through evaluation and quantification of - feasibility of alternative approaches ● Constraints
productivity gains; future cost avoidance; ● Assess costs and benefits of alternative ● Interfaces
cost savings, and Intangible benefits like approaches ● Reliability requirements
improvement in morale of employees. ● Report findings to the management with
Methods with the help of which the scope
Document / Deliverable: recommendation outlining the of the project can be analyzed are as
A preliminary investigation report/ acceptance or rejection of the proposal follows:
feasibility study for management. 2. IDENTIFICATION OF OBJECTIVE ● Reviewing internal documents
After the identification of the problem, it ● Conducting Interviews
is easy to work out the objectives of the
proposed solution.

4. FEASIBILITY STUDY: (LOBSTER Fry) ESTIMATING COST & BENEFIT


● Legal COSTS:
● Operational ● Development

● Behavioural ● Operational

● Schedule / Time ● Intangible

● Technical BENEFITS:
● Economical ● Tangible

● Resources ● Intangible

● Financial

323
324
STAGE - II : SYSTEMS ANALYSIS OF PRESENT SYSTEM SYSTEMS ANALYSIS OF PROPOSED
REQUIREMENTS ANALYSIS ● Review Historical Aspects SYSTEMS: After each functional area of
FACT FINDING TECHNIQUES: (Doctor ● Analyze Inputs the present information system has been
Interviews and Questions while ● Review Data Files Maintained
carefully analysed, the proposed system
Observation) ● Review Methods, Procedures & data
specifications must be clearly defined.
● Documents Communications
● Interviews ● Analyze Output
● Questionnaires ● Review Internal Controls
● Observations ● Model the Existing Physical & Logical
System
● Undertake Overall Analysis

SYSTEM DEVELOPMENT TOOLS: STRUCTURED ENGLISH: FLOWCHARTS:


1. System Components & Flows Structured English, also known as Flowcharting is a graphic technique that
● System Flow Chart (SFC) Program Design Language (PDL) or can be used by analysts to represent the
● Data Flow Diagram (DFD) Pseudo Code, is the use of the English inputs, outputs and processes of a business
- Data Source & destination language with the syntax of structured in a pictorial form. It is a common type of
- Data Flows programming. Thus, Structured English chart, that represents an algorithm or
aims at getting the benefits of both the process showing the steps as boxes of
- Transformation Process
programming logic and natural language. various kinds, and their order by
- Data Stores
Program logic that helps to attain precision connecting these with arrows. Flowcharts
● System Components Matrix
and natural language that helps in getting are used in analyzing, designing,
● CASE Tools the convenience of spoken languages. documenting or managing a process or
2. User Interface

Information Systems Control and Audit


program in various fields.
3. Data Attributes & Relationship
4. Detailed System Process
Revision
TYPES OF FLOW CHARTS BENEFITS OF FLOWCHART: LIMITATIONS OF USING
● Document flowchart ● Communication FLOWCHARTS:
● Data flowchart ● Effective analysis ● Complex logic

● System flowchart ● Proper documentation ● Alterations and Modifications

● Program flowchart ● Efficient Coding ● Reproduction

● Proper Debugging ● The essentials of what is done can easily

● Efficient Program Maintenance be lost in the technical details of how it is


done.

DECISION TREE: DATA DICTIONARY: It is a computer Data Dictionary Contains:


A Decision Tree (or tree diagram) is a file that contains descriptive information ● Data item’s length, type & range

support tool that uses a tree-like graph or about the data items in the files of a ● Identify of source document used to
model of decisions and their possible business information system. In other create data item
consequences, including chance event words, it is a computer file about data. ● Names of computer file storing data item
outcomes, resource costs, and utility. Uses: ● Names of computer programs that
DECISION TABLE: ● Aids in documentation - To modify data item
A Decision Table is a table which may Programmers & analysts ● Identity of individual permitted to access
accompany a flowchart, defining the ● File Security
● Identity of individual not permitted to
possible contingencies that may be ● For Accountant - Planning flow of access
considered within the program and the transaction data
appropriate course of action for each ● For Auditors - Establish audit trail
contingencyCondition Stub - which ● Aids in investigation / documenting
comprehensively lists the comparisons or internal control procedures
conditions;
● Condition Stub

● Action Stub

● Condition entries

● Action entries

325
326
LAYOUT FORM AND SCREEN SYSTEM SPECIFICATION ROLES INVOLVED IN SDLC
GENERATOR, MENU GENERATOR, At the end of the analysis phase, the ● Steering Committee
REPORT GENERATOR, CODE systems analyst prepares a document ● Project Manager
GENERATOR called “Systems Requirement ● Project Leader
● Layout form and Screen Generator Specifications (SRS)”, it contains: ● Systems Analyst / Business Analyst
● Menu Generator ● Introduction
● Module Leader / Team Leader
● Report Generator ● Information Description
● Programmer / Coder / Developer
● Code Generator ● Functional Description
● Database Administrator (DBA)
● Behavioural Description
● Quality Assurance
● Validation Criteria
● Tester
● Appendix
● Domain Specialist
● SRS Review
● IS Auditor

STAGE – III: SYSTEM DESIGN THE DESIGN PHASE INVOLVES: DESIGN OF DATABASE
System design involves first logical design ● Architectural Design ● Conceptual Modeling
and then physical construction of a system. ● Design of the Data / Information Flow ● Data Modeling
Design specifications instruct ● Design of the Database ● Storage Structure Design
programmers about what the system ● Design of the User-interface ● Physical Layout Design
should do. The programmers, in turn,
● Physical Design
write the programs that accept input from
● Design and acquisition of the hardware/
users, process data, produce the reports,
system software platform
and store data in the files.

Information Systems Control and Audit


Revision
DESIGN OF USER-INTERFACE Important factors in Input / Output PHYSICAL DESIGN:
Output Objectives: design: (CM’s Fraud on TV) Design Principles-
● Convey info about past, current, future ● Content ● The recommended procedure is to design

● Signal important events, opportunities, ● Media two or three alternatives and choose the
warnings ● Form best one on pre-specified criteria.
● Trigger an action ● Format ● The design should be based on the

● Confirmation of action ● Timeliness analysis.


● Meets needs of organisation & users ● Volume ● The software functions designed should
be directly relevant to business activities.
● The design should follow standards laid

down.
● The design should be modular.

STAGE – IV – Part 1: SYSTEM ADVANTAGES OF APPLICATION Validation of Vendors’ proposals: (Vice-


ACQUISITION SOFTWARE: (Royal Challengers Quit Chairman Manages Company’s Portfolio)
Acquisition Standards League) ● Vendor Support

● Ensuring security, reliability, and ● Rapid implementation ● Compatibility with Existing Systems
functionality already built into a ● Cost ● Maintainability of the proposed system
product. ● Quality ● Cost benefits of the proposed system
● Ensuring managers complete ● Low risk ● Performance rating of the proposed
appropriate vendor, contract, and METHODS OF VALIDATING system in relation to its cost
licensing reviews. PROPOSAL
● Including invitations-to-tender and ● Checklists
request-for-proposals. ● Point Scoring Analysis
● Establishing acquisition standards to
● Public evaluation Reports
ensure functional, security, and ● Benchmarking problem for vendor’s
operational requirements to be proposal
accurately identified and clearly detailed
● Test problems
in request-for-proposals.

327
328
STAGE – IV – Part 2 : DEVELOPMENT Characteristics Of A Good Coded Program Debugging
(PROGRAMMING TECHNIQUES AND Program: Debugging refers to correcting
LANGUAGES) ● Reliability programming language syntax and
Objective: ● Robustness diagnostic errors so that the program
To convert the specification into a ● Accuracy compiles cleanly. It consists of:
functioning system. ● Efficiency ● Inputting the source program to the

Activities: ● Usability
compiler,
Application programs are written, tested ● Letting the compiler find errors in the
● Readability
and documented, conduct system testing. program,
Document / Deliverable: ● Correcting lines of code that are

A fully functional and documented erroneous, and


system. ● Resubmitting the corrected source

program as input to the compiler.

STAGE – V: SYSTEM TESTING TYPES OF UNIT TESTING INTEGRATION TESTING


UNIT TESTING ● Static Analysis Testing: ● Bottom-up Integration

Categories of tests that a programmer - Desk Check ● Top-down Integration


typically performs on a program unit: - Structured walk-through ● Regression Testing
(Pooja Patel Feeds Shrey Shah) - Code inspection
● Performance Tests ● Dynamic Analysis Testing:
● Parallel Tests - Black Box Testing
● Functional Tests - White Box Testing
● Stress Tests - Gray Box Testing

Information Systems Control and Audit


● Structural Tests

SYSTEM TESTING FINAL ACCEPTANCE TESTING


● Recovery Testing ● Quality Assurance Testing
● Security Testing ● User Acceptance Testing:

● Stress or Volume Testing - Alpha Testing


● Performance Testing - Beta Testing
Revision
STAGE - VI : SYSTEM CONVERSION PROCEDURE: System Implementation Conversion
IMPLEMENTATION Activities for successful conversion: Strategies:
EQUIPMENT INSTALLATION (Fifa Played in South Africa) ● Direct Implementation / Abrupt change-

● Site Preparation ● File conversion: over


● Installation of New Hardware/Software ● Procedure conversion ● Phased implementation

● Equipment Checkout ● System conversion ● Pilot implementation

TRAINING PERSONNEL ● Scheduling personnel and equipment ● Parallel running implementation

● System Operators Training ● Alternative plans in case of equipment

● Users Training failure

STAGE - VII : POST- SYSTEM MAINTENANCE OPERATION MANUALS


IMPLEMENTATION REVIEW & ● Scheduled maintenance ● A cover page, a title page and copyright page;
MAINTENANCE ● Rescue maintenance ● A preface and information on how to navigate the user
● Development Evaluation ● Corrective maintenance guide;
● Operation Evaluation ● Adaptive maintenance ● A contents page;
● Information Evaluation ● Perfective maintenance ● A guide on how to use at least the main functions of

● Preventive maintenance the system;


● A troubleshooting section;

● A FAQ (Frequently Asked Questions);

● Where to find further help, and contact details;

● A glossary and an index.

329
CHAPTER 6 : AUDIT OF INFORMATION SYSTEMS

330
NEED FOR CONTROL AND EFFECT OF COMPUTERS ON 2. Changes to Evidence RESPONSIBILITY OF IS
AUDIT OF INFORMATION AUDIT Evaluation / New causes and AUDITOR
SYSTEMS 1. Changes to evidence sources of error: ● Sound knowledge of
● Organisational Costs of Data collection/ in the audit trail / ● System generated business operations
Loss audit evidence transactions ● Technical qualification and

● Incorrect Decision Making ● Data retention and storage ● Systematic Error certifications
● Costs of Computer Abuse ● Audit Evidence ● Understanding of

● Value of Computer ● Lack of Visible output information Risks and


Hardware, Software and ● Lack of a Visible audit trail Controls
Personnel ● Absence of Input ● Knowledge of IT strategies,

● Maintenance of Privacy documents policy and procedure


● Controlled Evolution of ● Legal issues
controls
Computer Use ● Knowledge of Professional

● System Effectiveness Standards and Best practices


Objectives ● Ability to understand

● System Efficiency Objectives technical and manual


controls relating to business
continuity.

FUNCTIONS OF IS CATEGORIES OF IS STEPS IN INFORMATION AUDIT TRAILS


AUDITOR AUDITS : (MISS Telephone) TECHNOLOGY AUDIT Objectives of Audit Trail :
(i) Inadequate information (i) Management of IT and (i) Scoping and pre-audit (DR. Audit)

Information Systems Control and Audit


security Enterprise Architecture survey 1. Detecting Unauthorized
(ii) Inefficient use of corporate (ii) Information Processing (ii) Planning and preparation Access
resources, or poor Facilities (iii) Fieldwork 2. Reconstructing Events
governance (iii) Systems and Applications (iv) Analysis 3. Personal Accountability
(iii) Ineffective IT strategies, (iv) Systems Development (v) Reporting
policies and practices (v) Telecommunications, (vi) Closure
(iv) IT-related frauds Intranets, and Extranets
Revision
PERFORMING IS AUDIT BASIC PLAN PRELIMINARY REVIEW
Audit Planning The objective of audit planning is to optimize the use of audit The following are some of the
(i) Materiality and resources. Important points are given as follows : critical factors, which should
significance are concepts ● The extent of planning will vary according to the size of the be considered by an IS auditor
the auditor uses to entity as part of his/ her preliminary
determine the planned ● Obtaining knowledge of the business review.
nature, timing, and extent ● The auditor may wish to discuss elements of the overall audit (i) Knowledge of the Business
of audit procedures. plan and certain audit procedures with the entity's audit (ii) Understanding the
(ii) Materiality and committee, the management and staff Technology
significance include both ● The auditor should develop and document an overall audit plan (iii) Understanding Internal
quantitative and describing the expected scope and conduct of the audit. Control Systems
qualitative factors ● The audit should be guided by an overall audit plan and (iv) Legal Considerations and
underlying audit program and methodology. Audit Standards
(v) Risk Assessment and
Materiality

Risks are categorised as DOCUMENTATION BY AUDITOR CONCURRENT OR


follows : As per (SA 200) "Overall Objectives of An Independent Auditor CONTINUOUS AUDIT AND
● Inherent Risk and Conduct of An Audit in Accordance With Standards of EMBEDDED AUDIT
● Control Risk Auditing", any opinion formed by the auditor is subject to inherent MODULES : (She Is Smart
● Detection Risk limitations of an audit, which include : and Cool but Arrogant)
● The nature of financial reporting; 1. Snapshots
● The nature of audit procedures; 2. Integrated Test Facility (ITF)
● The need for the audit to be conducted within a reasonable 3. System Control Audit
period of time and at a reasonable cost. Review File (SCARF)
● The matter of difficulty, time, or cost involved. 4. Continuous and Intermittent
● Fraud, particularly fraud involving senior management or
Simulation (CIS)
collusion. 5. Audit Hooks
● The existence and completeness of related party relationships

and transactions.
● The occurrence of non-compliance with laws and regulations.

● Future events or conditions that may cause an entity to cease to


continue as a going concern.

331
332
ADVANTAGES DISADVANTAGES UNDERSTANDING THE AUDIT TRAIL FOR
● Timely, comprehensive and ● Auditors should be able to LAYERS AND RELATED APPLICATION CONTROLS
detailed auditing obtain resources AUDIT ISSUES Boundary Controls
● Surprise test capability ● More likely to be used if (i) Operational Layer Audit trail includes
● Information to system staff auditors are involved in the (ii) Tactical Layer ● Identify would be user of
on meeting of objectives development (iii) Strategic Layer system.
● Training for new users ● Auditors need the ● Authentication Information
knowledge and experience of supplied.
working with computer ● Resources requested.
systems ROLE OF IS AUDITOR IN ● Action privileges requested.
● Continuous auditing PHYSICAL ACCESS ● Start and finish time.
techniques are more likely to CONTROLS ● Number of sign on attempts.
be used where the audit trail 1. Risk assessment ● Log in and log out time.
is less visible and the costs of
2. Controls assessment ● Action privileges allowed /
errors and irregularities are
3. Planning for review of denied.
high.
physical access controls

Input Controls Processing Controls Output Controls


● Identity of person who was source of data. ● To trace the processing ● What output was presented
● Identity of person who entered the data into the system. performed on data item. to users.
● Time and date when data was captured. ● Comprehensive log on ● Who received the output.

● Physical device used to enter data into system. hardware consumption - ● When the output was

● The record to be updated by the transaction.


CPU usage time, storage received.

Information Systems Control and Audit


● Standing data to be updated.
space used and ● What actions were taken
communication facilities with the output.
● Detail of the transaction.
used.
● Physical or logical batch used for processing.
● Comprehensive log on
● Number of keying errors.
software consumption.
● Number of data coding errors.
● Compilers used, file
management systems used
and communication software
used.
Revision
Data-Base Controls Communication Controls
● To attach unique time stamp ● Unique identifier of the
to all transaction. source.
● To attach before and after ● Time and date at which
images of data. message was received by the
● Any modifications or source.
corrections to audit trail ● Time and date at which node
transaction accomodating in the network was
the change that occur within transversed by the message.
an application system. ● Message sequence number
● To maintain a chronology of and the image of the
resource consumption message received at each
events that affects the data node traversed in the
base. network.
● Log of system restarts.

● Message transit times.

● Queue length at each node.

333
CHAPTER 7 : INFORMATION TECHNOLOGY REGULATORY ISSUES

334
REQUIREMENTS OF IRDA FOR SYSTEM CONTROLS AND REQUIREMENTS OF RBI FOR SYSTEM CONTROLS AND
AUDIT AUDIT
(i) System Audit (i) System Controls
(ii) Preliminaries ● Duties of system designer should be assigned to persons

(iii) System Controls operating the system and there should be separate persons
● There should be Electronic transfer of Data without manual dedicated to system design.
intervention. ● Contingency plans in case of failure of system should be

● The auditor should comment on the audit trial maintained introduced and tested at periodic intervals.
in the system for various activities. ● An appropriate control measure should be devised.

● The auditor shall also ascertain that the system has separate ● Uniformity of software used by various branches / offices.

logins for each user and maintains trail of every transaction ● Board of Directors and senior management are responsible
with respect to login ID, date and time for each data entry, for ensuring that an institution's system of internal controls
authorisation and modifications. operates effectively.
● Annual review of IS Audit Policy.

● Quality assurance, at least once every three years.

(ii) System Audit

REQUIREMENTS OF SEBI FOR SYSTEM CONTROLS AND


AUDIT
(i) Systems Audit
(ii) Audit Report Norms

Information Systems Control and Audit


(iii) Auditor Selection Norms
(iv) System Controls :
● Further, along with the audit report, Stock Exchanges /
Depositories are advised to submit a declaration from the
MD / CEO certifying the security and integrity of their IT
Systems.
● A proper audit trail for upload / modifications / downloads
of KYC data to be maintained.
Revision
SECURITY STANDARDS ISO 27001 - INFORMATION SECURITY MANAGEMENT
Major objectives of this policy are given as follows : STANDARD (ISMS)
● To create a secure cyber ecosystem These phases are given as follows : (I Plan to Do Check-up
● To create an assurance framework Actually)
● To strengthen the Regulatory framework ● The Plan Phase

● To enhance and create National and Sectorial level 24*7 ● The Do Phase

mechanisms ● The Check Phase

● To enhance the protection and resilience of Nation's critical ● The Act Phase

information infrastructure by operating a 24*7 National Critical


Information BENEFITS ITIL (IT INFRASTRUCTURE
● To develop suitable indigenous security technologies ● Extension of the current LIBRARY)
● To improve visibility of the integrity of ICT products and quality ● Service Strategy
services ● Opportunity to identify and ● Service Design
● To create a workforce of 5,00,000 professional skilled in cyber manage risks ● Service Transition
security ● Provides confidence and ● Service Operation
● To provide fiscal benefits to businesses assurance ● Continual Service
● To enable protection of information while in process, handling, ● An independent review and Improvement
storage and transit assurance
● To enable effective prevention, investigation and prosecution of

cybercrime;
● To create a culture of cyber security and privacy enabling

responsible user behaviour and actions;


● To develop effective public private patnerships;

● To enhance global cooperation.

HOW STANDARD WORKS Structure of ISO 27001


ISO 27001 requires that management - Clause 1 : Scope Clause 7 : Support
● Systematically examine organisation information security risk. Clause 2 : Normative references Clause 8 : Operation
threats, vulnerabilities and impacts) Clause 3 : Terms of Definitions Clause 9 : Performance
● Design and implement comprehensive security controls and/or Clause 4 : Context of evaluation
other form of risk treatment. organisation Clause 10 : Improvement
● Adopt management process to ensure that information security Clause 5 : Leadership
controls continue to meet organisation information security Clause 6 : Planning
need.

335
CHAPTER 8 : EMERGING TECHNOLOGIES

336
CLOUD VS GRID GOALS OF CLOUD COMPUTING : (I Saw CAR being Created CLOUD COMPUTING
COMPUTING in front of my Eyes) ARCHITECTURE
● Scalability 1. "Anywhere Access" (AA) ● Front End Architecture

● Multi-tasking 2. To scale the IT ecosystem quickly, easily and cost-effectively. ● Back End Architecture

● Storage 3. To consolidate IT infrastructure into a more integrated and ● Middleware

● Focus manageable environment.


4. To access services and data from anywhere at anytime.
5. To reduce costs related to IT energy/power consumption.
6. To create a highly efficient IT ecosystem.
7. To enable rapidly provision resources as needed.

CLOUD COMPUTING CLOUD COMPUTING MODELS 2. Platform as a Service 3. Software as a Service (SaaS)
ENVIRONMENT 1. Infrastructure as a Service (IaaS) (PaaS) Services
(a) Public Clouds Services Services ● Business Services
(b)Private Clouds ● Storage ● Programming Languages ● Social Network
(c) Hybrid Clouds ● Network ● Framework/Templets ● Document Management
(d) Community Clouds ● Compute ● Database (For Software ● Mail Services

● Load Development) Characteristics


● Balances ● Other Tools ● Web access

Characteristics Characteristics ● Scalable

● Web Access ● Web Access ● High Availability

Information Systems Control and Audit


● Scalable ● Scalable ● Centralised

● Centralised ● Offline ● One to Many

● Shared Infrastructure ● All in One ● Multidevice Support

● Metered Services (Pay per use) ● Collaborative ● API Integration

Instances Instances
● NaaS ● TaaS

● STaaS ● APIaaS

● DBaaS ● EaaS

● BaaS 4. Network as a Service (NaaS)


● DTaaS 5. Communication as a Service (CaaS)
Revision
CHARACTERISTICS OF CLOUD COMPUTING : (Multiple ADVANTAGES OF CLOUD COMPUTING : (Efficient Iphone
Services Should be Performed and Maintained by ARAV) Quickly Stores and Back-up's Automatically)
1. Multi-Sharing 1. Cost Efficiency
2. Services in Pay-Per-Use Mode 2. Easy Access to Information
3. High Scalability 3. Quick Deployment
4. Performance 4. Almost Unlimited Storage
5. Maintenance 5. Backup and Recovery
6. High Availability and Reliability 6. Automatic Software Integration
7. Agility
8. Virtualisation

CHALLENGES RELATING PERTINENT ISSUES : (Teach MOBILE COMPUTING


TO CLOUD COMPUTING : Emraan SUSHI) 1. Mobile Computing Benefits
(CIA Guys Talks A Lot About 1. Threshold Policy ● It provides mobile workforce with remote access to work order
Data Privacy but Manages 2. Environment Friendly Cloud details
Several Incidents Computing ● It enables mobile sales personnel to update work order
Apathetically) 3. Security Issues ● It facilitates access to corporate services
1. Confidentiality 4. Unexpected Behaviour ● It provides remote access to the corporate knowledgebase
2. Integrity 5. Software Development in ● It enables to improve management effectiveness
3. Availability Cloud 2. Components of Mobile Computing
4. Governance 6. Hidden Costs ● Mobile Hardware
5. Trust 7. Interoperability ● Mobile Software
6. Audit ● Mobile Communication
7. Legal Issues and 3. Limitations of Mobile Computing
Compliance
● Security
8. Application Security
● Power Consumption
9. Data Stealing
● Health Hazards
10. Privacy
● Insufficient Bandwidth
11. Identity Management and
● Transmission Inferences
Access Control
● Human Intervention with Device
12. Software Isolation
13. Incident Response
14. Architecture

337
338
4. Issues in Mobile BENEFITS AND CHALLENGES FOR SOCIAL NETWORKS BYOD
Computing USING WEB 2.0 Risks can be classified into
● Security Issues Benefits four areas as outlined below :
- Confidentiality 1. It provides a platform (I Need Apple Devices)
- Integrity 2. No new knowledge skills are required. 1. Implementation Risks
- Availability 3. Web 2.0 techniques are very people centric activities 2. Network Risks
- Legitimate 4. People are coming much closer to another 3. Application Risks
- Accountability 5. Using Web 2.0 also increases the social collaboration to a very 4. Device Risks
● Bandwidth high degree
● Location Intelligence Number of challenges
● Power Consumption 1. Data security and privacy
● Revising the Technical 2. Privacy of individual users also arises
Architecture 3. A majority of the social networks are offline
● Reliability, Coverage, 4. This becomes more viable in the areas of the world that are
Capacity and Cost developing
APPLICATION OF WEB 2.0
● Integration with Legacy
1. Social Media
Mainframe and Emerging
TYPES AND BEHAVIOUR SOCIAL MEDIA AND 2. Marketing
Client/Server Applications
OF SOCIAL NETWORKS WEB 2.0 3. Education
● Business Challenges
● Social Contract Networks Components of Web 2.0 for
● Study Circles Social Networks APPLICATION OF WEB 3.0
ADVANTAGES/BENEFITS
● Social Networks for ● Communities 1. Semantic Web
OF BYOD
Specialist Groups ● Blogging 2. Web Services
1. Happy Employees

Information Systems Control and Audit


● Networks for Fine Arts ● Wikis
2. Lower IT Budgets
● Police and Military ● Folksonomy GREEN COMPUTING BEST
3. Reduced/Lower IT Support
Networks ● File Sharing/Podcasting PRACTICES
Requirement
● Sporting Networks ● Mashups ● Develop a Sustainable Green
4. Early Adoption of New
● Mixed Networks ● Ajax Computing Plan
Technologies
● Social Networks for the ● RSS - Generates Syndication ● Recycle
5. Increase Employee
'Inventors' ● Make Environmentally
Efficiency
● Shopping and Utility Service Sound Purchase Decisions
Networks ● Reduce Paper Consumption

● Others ● Conserve Energy

You might also like