ISCA Notes by Vipin Nair
ISCA Notes by Vipin Nair
ISCA Notes by Vipin Nair
Nikhil Gupta
ISCA
INFORMATION
SYSTEM
INFORMATION
SYSTEM CONTROLS
AND
SECURITY
AUDITING &
INFORMATION
SYSTEM
IT
REGULATERY
ISSUES
EMERGING
TECHNOLOGY
INDEX
CHAPTER 1 - Concept of Governance and Management of
Information Systems
CHAPTER 2 - Information System Concepts
CHAPTER 3 Protection of Information Systems
CHAPTER 4 Business Continuity Planning and Disaster recovery
planning
CHAPTER 5 Acquisition, Development and Implementation of
Information Systems (SDLC)
CHAPTER 6 - Auditing & Information Systems
CHAPTER 7 Information Technology Regulatory issues
CHAPTER 8 Emerging Technology
CA Clues
Nikhil Gupta
CHAPTER 1
CONCEPTS OF GOVERNANCE AND MANAGEMENT
OF INFORMATION SYSTEMS
1.1. The Concept of Governance
The term "Governance" specifies the ability of an organization to be able to control and regulate its
own operation so as to avoid conflicts of interest related to the division between beneficiaries
(shareholders) and people involved in the company.
The term Governance is derived from the Greek verb meaning to steer. A governance system
typically refers to all the means and mechanisms that will enable multiple stakeholders in an
enterprise to have an organized mechanism for evaluating options, setting direction and monitoring
compliance and performance, in order to satisfy specific enterprise objectives.
The set of responsibilities and practices exercised by the board and executive management with
CA Clues
Nikhil Gupta
the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that
risks are managed appropriately and verifying that the organizations resources are used
responsibly.
Enterprise governance is an overarching framework into which many tools and techniques and
codes of best practice can fit. Examples include codes on corporate governance and financial
reporting standards.
Achieving enterprise objectives by ensuring that each element of the mission and strategy are
assigned and managed with a transparent decisions rights.
Defining and encouraging desirable behavior in the use of IT and in the execution of IT
outsourcing arrangements.
Implementing and integrating the desired business processes into the enterprise.
Providing stability and overcoming the limitations of organizational structure.
Improving customer
business and internal relationships and satisfaction
reducing internal territorial strife by formally integrating the customers, business units, and external
IT providers into a holistic IT governance framework
Enabling effective and strategically aligned decision making for the IT Principles.
CA Clues
Nikhil Gupta
This dimension does not lend itself easily to a regime of standards and assurance as this is specific
to enterprise goals and varies based on the mechanism to achieve them.
The performance dimension in terms of the overall strategy is the responsibility of the full board
but there is no dedicated oversight mechanism as comparable to the audit committee
It is advisable to develop appropriate best practices, tools and techniques
CA Clues
Nikhil Gupta
1.2. IT Governance
IT governance is the system by which IT activities in a company or enterprise are directed and controlled to
achieve business objectives with the ultimate objective of meeting stakeholder needs. Hence, the overall
objective of IT governance is very much similar to corporate governance but with the focus on IT. Hence, it can
be said that there is an inseparable relationship between corporate governance and IT governance or IT
Governance is a sub-set of Corporate or Enterprise Governance.
CA Clues
Nikhil Gupta
It provides a consistent approach integrated and aligned with the enterprise governance approach.
It ensures that IT-related decisions are made in line with the enterprise's strategies and objectives.
It ensures that IT-related processes are overseen effectively and transparently.
It confirms compliance with legal and regulatory requirements.
It ensures that the governance requirements for board members are met.
CA Clues
Nikhil Gupta
The concept of Corporate Governance has succeeded in attracting a good deal of public interest
because of its importance for the economic health of corporations, protect the interest of
stakeholders including investors and the welfare of society.
Corporate Governance has been defined as the system by which business corporations are directed
and controlled.
The corporate governance structure specifies the distribution of rights and responsibilities among
different participants in the corporation, such as, the Board, managers, shareholders and other
stakeholders, and spells out the rules and procedures for making decisions on corporate affairs.
Best practices of corporate governance include the following:
o Clear assignment of responsibilities and decision-making authorities, incorporating an
hierarchy of required approvals from individuals to the board of directors;
o Establishment of a mechanism for the cooperation among the board of directors, senior
management and the auditors;
o Implementing strong internal control systems such as internal and external audit functions,
risk management functions independent of business lines, and other checks and balances;
o Special monitoring of risk exposures where conflicts of interest are likely to be particularly
great, including business relationships with borrowers affiliated with the bank, large
shareholders, senior management, or key decision-makers within the firm .
o Financial incentives to act in an appropriate manner offered to senior management,
business line management and employees in the form of compensation and promotion.
o Appropriate information flows internally and to the public.
CA Clues
Nikhil Gupta
Commission (COSO) highlights the need for management to implement a system of risk
management at the enterprise level.
Enterprise risk management deals with risks and opportunities affecting value creation or
preservation.
It is important for management to ensure that the enterprise risk management strategy considers
implementation of information and its associated risks while formulating IT security and controls as
relevant.
IT security and controls are a sub-set of the overall enterprise risk management strategy and
encompass all aspects of activities and operations of the enterprise
SECs final rules define internal control over financial reporting as a process designed by, or
under the supervision of,
o the companys principal executive and principal financial officers,
o persons performing similar functions
o effected by the companys board of directors, management and other personnel,
o to provide reasonable assurance regarding the reliability of financial reporting
The preparation of financial statements for external purposes in accordance with generally accepted
accounting principles and includes those policies and procedures that:
o Pertain to the maintenance of records that in reasonable detail accurately and fairly reflect
the transactions and dispositions of the assets of the company;
o Provide reasonable assurance that transactions are recorded as necessary to permit
preparation of financial statements in accordance with generally accepted accounting
o Provide reasonable assurance regarding prevention or timely detection of unauthorized
acquisition, use, or disposition of the companys assets that could have a material effect on
the financial statements.
Standards (FAS) and International Accounting Standards (IAS) or local rules via policy enforcement
and risk avoidance methodology called Internal Control.
SOX made a major change in internal controls by holding Chief Executive Officers (CEOs) and Chief
Financial Officers (CFOs) personally and criminally liable for the quality and effectiveness of their
organizations internal controls. Part of the process is to attest to the public that an organizations
internal controls are effective.
Internal controls can be expected to provide only a reasonable assurance, not an absolute
assurance, to an entitys management and board.
There must be a system of checks and balances of defined processes that lead directly from actions
and transactions reporting to an organizations owners, investors, and public hosts.
CA Clues
Nikhil Gupta
Day by day enterprises are using IT not just for data processing but more for strategic and
competitive advantage too. IT has not only automated the business processes but also transformed
the way business processes are performed. It is needless to emphasize that IT is used to perform
business processes, activities and tasks and it is important to ensure that IT deployment is oriented
towards achievement of business objectives.
IT not only as an information processing tool but more from a strategic perspective to provide
better and innovative services .
IT strategic plans provide direction to deployment of information systems and it is important that
key functionaries in the enterprise are aware and are involved in its development and
implementation.
The strategic planning process has to be dynamic in nature and IT management and business
process owners should ensure a process is in place to modify the IT long-range plan in a timely and
accurate manner to accommodate changes to the enterprise's long-range plan and changes in IT
conditions. Management should establish a policy requiring that IT long and short-range plan are
developed and maintained.
Management should ensure that IT long and short-range plans are communicated to business
process owners and other relevant parties across the enterprise.
CA Clues
Nikhil Gupta
o
o
o
Strategic Planning
Management Control
Operational Control.
Strategic planning is the process by which top management determines overall organizational
purposes and objectives and how they are to be achieved.
Management control is defined as the process by which managers assure that resources are
obtained and used effectively and efficiently in the accomplishment of the enterprise's objectives.
Operational control is defined as the process of assuring that specific tasks are carried out
effectively and efficiently.
The enterprise strategic plan provides the overall charter under which all units in the enterprise,
including the information systems function must operate.
It is the primary plan prepared by top management of the enterprise that guides the long run
development of the enterprise.
It includes a statement of mission
CA Clues
Nikhil Gupta
The information system requirements plan defines information system architecture for the
information systems department.
The architecture specifies the major organization functions needed to support planning, control and
operations activities and the data classes associated with each function.
Some of the key enablers of the information architecture are:
o Automated data repository and dictionary,
o Data syntax rules,
o Data ownership and criticality/security classification,
o An information model representing the business, and
o Enterprise information architectural standards.
Senior management is responsible for developing and implementing long and short-range plans that
enable achievement of the enterprise mission and goals.
Senior management should ensure that IT issues as well as opportunities are adequately assessed
and reflected in the enterprise's long- and short-range plans.
CA Clues
Nikhil Gupta
Assess the current environment, capabilities and performance (performance of current internal
business and IT capabilities and external IT services)
Define the target IT capabilities (understanding of the enterprise environment and requirements)
Conduct a gap analysis (gaps between the current and target environments)
Define the strategic plan and road map (how IT- related goals will contribute to the enterprises
strategic goals. Include how IT will support IT-enabled investment programs, business processes, IT
services and IT assets.)
Communicate the IT strategy and direction (Create awareness and understanding of the business
and IT objectives and direction)
Enterprise Risk Management and IT Risk Management are key components of an effective IT
governance structure of any enterprise. Effective IT governance helps to ensure close linkage to the
enterprise risk management activities, including Enterprise Risk Management (ERM) and IT Risk
Management.
It is the process of assessing risk and taking steps to reduce risk to an acceptable level and
maintaining that level of risk.
CA Clues
Nikhil Gupta
Risk management involves identifying, measuring, and minimizing uncertain events affecting
resources.
Based on the point of impact of risks, controls are classified as Preventive, Detective and Corrective.
Preventive controls prevent risks from actualizing. Detective controls detect the risks as they arise.
Corrective controls facilitate correction.
The risks in IT environment are mitigated by providing appropriate and adequate IS Security.
IS security is defined as "procedures and practices to assure that computer facilities are available at
all required times, that data is processed completely and efficiently and that access to data in
computer systems is restricted to authorized people".
1.9.2.
Sources of Risk
Natural Events,
The key governance practices for evaluating risk management are given as following:
Key Management Practices for implementing Risk Management are given as following:
1) Collect Data
2) Analyze Risk
3) Maintain a Risk Profile
4) Articulate Risk
5) Define a Risk Management Action Portfolio
6) Respond to Risk
CA Clues
Nikhil Gupta
In the US, Sarbanes Oxley Act has been passed to protect investors by improving the accuracy and
reliability of corporate disclosures made pursuant to the securities laws, and for other purposes.
In India, Clause 49 of listing agreement issued by SEBI mandates similar implementation of
enterprise risk management and internal controls as appropriate for the enterprise.
IT Act, which was passed in 2000 and amended in 2008 provides legal recognition for electronic
records and also mandates responsibilities for protecting information.
It is important for enterprises to be aware and well conversant of IT compliances.
It implement processes and practices to manage these compliances both from conformance and
performance perspective.
This process is designed to evaluate that IT processes and IT supported business processes are
compliant with laws, regulations and contractual requirements.
Legal and regulatory compliance is a key part of the effective governance of an enterprise.
The COBIT 5 framework includes the necessary guidance to support enterprise GRC objectives and
supporting activities.
COBIT 5 enables enterprises in achieving their objectives for the governance and management of
enterprise IT. The best practices of COBIT 5 help enterprises to create optimal value from IT by
maintaining a balance between realizing benefits and optimizing risk levels and resource use.
COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise,
taking in the full end-to-end business and IT functional areas of responsibility, considering the IT
related interests of internal and external stakeholders.
COBIT 5 helps enterprises to manage IT related risk and ensures compliance, continuity, security and
privacy.
COBIT 5 enables clear policy development and good practice for IT management including increased
business user satisfaction.
CA Clues
Nikhil Gupta
issues. COBIT 5 is a set of globally accepted principles, practices, analytical tools and models that can
be customized for enterprises of all sizes, industries and geographies. It helps enterprises to create
optimal value from their information and technology.
COBIT 5 provides the tools necessary to understand, utilize, implement and direct important IT
related activities, and make more informed decisions through simplified navigation and use.
Increased value creation from use of IT
User satisfaction with IT engagement and services
Reduced IT related risks and compliance with laws, regulations and contractual requirements;
Development of more business-focused IT solutions and services
Increased enterprise wide involvement in IT-related activities.
COBIT 5 simplifies governance challenges with five principles. The five key principle are following:-
The COBIT 5 framework describes seven categories of enabler which are :1) Principles, policies and frameworks
2) Processes
3) Organizational structures
4) Culture , Ethics and Behaviors
5) Information
6) Services , Infrastructure and Applications
7) People , skills and Competencies
CA Clues
Nikhil Gupta
-: QUESTION SECTION :-
Q.12. Explain Key Management Practices for Aligning IT Strategy with Enterprise Strategy
Ans. (Refer 1.8.4)
CA Clues
Nikhil Gupta
CHAPTER 2
INFORMATION SYSTEM CONCEPTS
2.1. System
Definition: A set of interrelated elements that operate collectively to accomplish
Set of Elements
(Inputs)
WORK
TOGETHER
(PROCESS)
Objectives/ Goals
(Outputs)
System Definition
CA Clues
i.
ii.
iii.
iv.
v.
Nikhil Gupta
Elements
Interactive Behavior
Degree of Human Intervention
Working / Output
1. According to Elements
Abstract Systems : An abstract systems is that system, which does not contain any physical components.
It is an orderly arrangement of ideas.
Example: Computer program, Architectural design, Blue print etc.
Physical Systems :
Physical System are concrete operational systems made up of people, materials,
machines and other physical things.
Physical systems are more common than abstract systems. Elements in such systems
interact with each other to achieve an objective. For example: Computer Systems,
Transport Systems etc.
All the working systems are physical systems.
Open System: An open system is one, which interacts with its environment and can mould or adapt
itself according to requirement of environment. All living systems for example,
humans animals and plants etc are open systems.
Open system interacts freely with its environment by taking input & returning output.
An organization , which is sensitive to changes of customer preferences like product
prices, looks and packaging etc and adjust its products as per customers requirements
is essentially an open organization . All organizations are essentially open systems as
they can not work in isolation. Thus the system Analyst usually deals with adaptive
and open systems.
Open systems are difficult to develop and maintain than closed system, but exist for
longer period or have longer life span than closed system.
Example: Education system , political system etc.
CA Clues
Nikhil Gupta
Closed System : A Closed system is one, which does not change itself as per the requirement of
environment.
There are two types of closed system
(1) Completely Closed:o A system which does not interact with the environment nor changes with
the change in environment is termed as a completely closed system.
o Completely closed systems are available only in scientific applications.
These systems do not interact with environment.
(2) Relatively closed:o Relatively closed systems are those systems, which interact with
environment but do not change themselves as per requirement of
environment.
o A relatively closed system is one that has only controlled and well defined
inputs and outputs.
o The relatively closed system is not affected by disturbances from outside
the system.
Manual Systems: Systems where data collection, manipulation, maintenance & final reporting are
carried out absolutely by human efforts.
Ex: manual accounting
Automated Systems: Systems where computers are used to carry out all the tasks mentioned above.
However , non of the business system is 100% automated ; rather , to some extent, it
depends on manual intervention , may be in a negligible way.
Deterministic : A system is called deterministic when inputs, process and outputs are known with
certainty.
In deterministic system one can predict the output with certainty i.e. deterministic
system operates in a predictable manner.
A deterministic system operates in predictable manner
An accounting system is normally a deterministic system.
Ex: computer system , correct input gives correct output.
Probabilistic : A probabilistic system is one in which output can only be predicted in probabilistic
terms.
A probabilistic system provides expected output.
Demand Forecasting system is a probabilistic system.
Probabilistic system behavior is not predictable.
Ex:- Inventory , weather report.
CA Clues
Nikhil Gupta
2) System Environment:
o The Components outside the system boundary with which system interacts is known
as environment of system.
o A business system normally have customer, Govt. Dept, Supplier etc as part of
Environment.
o A system continuously interacts with its environment components.
o Ex: Net banking & smart phones are invented due to the need & demand of the
environment.
3) System Boundary:
o The boundary of system defines the extent (limits) of system within which system
components work together.
o In order to understand a system, users need to define or describe the system under
study. This is done with the help of boundary.
o A system exists inside the boundary, whereas environment exists outside the
boundary.
4) Supra System
o Entity formed by a system and other equivalent systems with which it interacts.
o A system immediate above a sub system is known as supra system.
o A sub system is governed or controlled by its supra system.
5) Subsystem
o A subsystem is a part of a larger system.
o It is difficult to manage a big system as a single system or as a whole. Therefore, a
big system is divided into smaller parts known as sub-system.
o Sub-system help to manage and develop a complex big system efficiently.
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
Any system, if not maintained properly would decay or can becomes disordered or
disorganized .
This decaying process of system in system terminology is known as increase in entropy.
In order to prevent decaying process of system, a negative entropy or maintenance of inputs
or energy to inputs and process is required.
The open system requires more negative entropy or energy to inputs and processes than the
closed systems. But almost all the system requires the energy or system maintenance.
Like in an information system if user is not getting the outputs as per requirement than it
require to change or upgrade the program as per his requirement.
2.2. Information
Information defined by Davis and Olson as- Information is data that has been proposed
into a form that is meaningful to the recipient and is of real or perceived value in current or
progressive decision.
Information is data that have been put into a meaningful and useful context for the intended
recipient.
The relation of data to information is that of raw material to finished product.
Information is a necessary and key input in any decision making process.
Information is organized and compiled data that has some value to the receiver or
information is data that has been transferred into a meaningful and useful form for specific
purpose.
Information is crucial for business decisions. It plays a vital role in the survival of a business.
The characteristics of information are mainly concerned with quality of information i.e its
fitness to use, or its reliability.
The important characteristics of useful and effective information are as follows :
1.
Timeliness or Availability:
Information must be available at all times.
If information is not available at the time of need, it is useless.
Timeliness means that information must reach the recipients within the prescribed
time frame. For effective decision making, information must reach the decision
maker at right time. Delays, of whatever nature destroy the value of information.
The characteristics of timeliness, to be effective, should also include up- to date,
i.e. current information. In other words timely information does not mean in time
information only, timely information means in-time as well as updated
information.
2.
Relevance or Purpose :
Relevance is another key attribute of information.
CA Clues
Nikhil Gupta
3.
4.
Redundancy :
It signifies duplication and it is not a desired attribute, however it can be used for
error control.
Redundancy means excess of information carried per unit of data. Redundancy is
sometime necessary in order to safeguard against errors. We can say information
must be in sufficient quantity for correct decision making.
5.
Accuracy :
Accuracy is very important attribute of information.
Accuracy means information should be free from errors. Accuracy also means
that information is free from biasness. As managers decisions are based on the
information supplied in MIS report, therefore, all managers need accurate
information.
6.
Completeness :
Information should be as complete as possible.
No piece of information essential to a decision should be missing.
The information, which is provided to managers must be complete and should
meet all their needs.
In situations, where providing complete information is not feasible for one reason
or the other, the manager must be informed of this fact, so that due care in this
regard may be taken by providing a footnote along with the information about
information completeness.
7.
Reliability :
It is a measure of failure or success of using information for decision-making.
If an information leads to correct decision on many occasions, we say the
information is reliable.
CA Clues
Nikhil Gupta
Information should be from reliable sources, if the sources are external from
which the information is obtained the information sources names should be
indicated for reliability purpose.
8.
Transparency :
Information must reveal directly what we want to know for decision-making.
Information should be free from any business. It should not have any influential
factor of person / company who is providing the information.
9.
Quality :
Quality refers to the correctness of information.
Errors may be the result of incorrect data measurement and calculation methods,
failure to follow processing procedure and loss or no processing of data.
Validity :
It should meet the purpose for which it is being collected.
10.
11.
Rate :
A useful information is the one which is transmitted at a rate which matches with
the rate at which the recipient wants to receive.
12.
Value of information :
If new information causes a different decision to be made , The value of the new
information is the difference in value between the outcome of the decision and
that of the new decision, less the cost of obtaining the information.
Here dimension means criteria for which information is valued in business organization.
Normally information importance is evaluated from economic point of view, business point
of view and technical point of view etc.
Therefore these three criteria are known as dimension of information:
1.
Economic dimension ( Cost V/s Benefits ) : This dimension of information
refers to the cost of information and its benefits. Generation of information
cost money. To decide about the money to be spent on information generation,
a cost benefit analysis should be undertaken. Although it is difficult to
measure the cost and benefits of information because of its intangible
characteristics.
Cost of Information : Cost of information include, cost of acquiring data,
cost of maintaining data, cost of generating information and cost of
communicating information etc.
Value of Information : Value of information is value of the change in
decision behaviour because of information. It is difficult to measure exact cost
benefit analysis of information because of its intangible characteristics.
2.
Business Dimension : Business dimension means different types of
information required by manages at different levels of management hierarchy
and its use in decision making. This dimension provides the importance of
information for business decision making and business continuity.
3.
Technical Dimension : This dimension refers about the security of
information i.e. how, information will be stored and communicated etc. safely.
CA Clues
Nikhil Gupta
This dimension is mainly related with database i.e. the way the data is
arranged so that it is available to its authorized user when required and in
secured manner.
2.2.3.
Types of Information
(1)
(2)
External Information :
This information is obtained from outside the organization boundary.
This information is related with the environment of organization, in which
organization operate.
The environment information primarily includes the following:
o Government Policies : Information about concessions, benefits, restrictions
of government policies in respect of tax concessions or any other aspects,
which may be useful to the organization in the future period.
o Major factors of production : Information related with source, cost,
location, availability, accessibility and productivity of the major factors of
production viz. (i) labour (ii) materials and parts, and ( iii) capital.
o Technological environment : Forecast of any technological changes in the
industry and the probable effects of it on the firm.
o Economic Trends : It includes information relating to economic indicates
like consumer disposal income, environment, productivity, capital
investment etc. such information is valuable for those firms specially, whose
output is a function of these important variables.
Internal Information :
This information is part of internal functioning of organization.
Various internal functional areas of organization are: Financial plans
Policies
Supply factors
Sales forecast
An information system comprise of people, hardware, software, data and network for communication
support.
Here, people mean the IT professionals i.e. system administrator, programmers and end users i.e.
CA Clues
Nikhil Gupta
the persons, who can use hardware and software for retrieving the desired information.
The hardware means the physical components of the computers i.e. server or smart terminals with
different configurations like corei3/corei5/corei7 processors etc. and software means the system
software (different types like of operating systems e.g. UNIX, LINUX, WINDOWS etc.), application
software (different type of computer programs designed to perform specific task) and utility software
(e.g. tools).
The data is the raw fact, which may be in the form of database. The data may be alphanumeric,
text, image, video, audio, and other forms.
The network means communication media (internet, intranet, extranet etc.).
Some of important roles of information system other than the cost reductions, waste
reductions and increase revenue in business are as follows :
Help managers in effective decision making to achieve the organizational goal.
Helps to take right decision at the right time.
Help organizations to gain edge in the competitive environment.
Helps to execute innovative ideas efficiently
Helps in solutions of complex and critical problems
Helps to utilize knowledge gathered though information system in day business
operation.
Helps to implement the formulated strategy with integrated business operations /
functions.
All systems work for predetermined objectives and the system is designed and developed
accordingly.
If one subsystem or component of a system fails; in most of the cases, the whole system does not
work. However, it depends on how the subsystems are interrelated.
The work done by individual subsystems is integrated to achieve the central goal of the system. The
goal of individual subsystem is of lower priority than the goal of the entire system.
Production or Manufacturing
The objective of this subsystem is to optimally deploy man, machine and material to
maximize production or service.
This system generates production schedules and schedules of material requirements,
CA Clues
Nikhil Gupta
monitors the product quality, plans for replacement or overhauling the machinery and also
helps in overhead cost control and waste control.
Inventory /Stores Management It is designed to keeping the track of materials in the stores.
The system is used to regulate the maximum and minimum level of stocks, raise alarm at
danger level stock of any material, give timely alert for re-ordering of materials with optimal
re-order quantity.
Similarly well-designed inventory management system for finished goods and semi-finished
goods provides important information for production schedule and marketing/sales strategy.
Human Resource Management Human resource is the most valuable asset or backbone for an organization.
Effective and efficient utilization of manpower in a dispute-free environment in this key
functional area ensures to facilitate disruption free and timely services in business.
Human resource management system aims to achieve this goal. Skill database maintained
in HRM system, with details of qualifications, training, experience, interests etc. helps
management for allocating manpower to right activity at the time of need or starting a new
project.
This system also keeps track of employees output or efficiency.
operations.
OSS produces a variety of information for internal and external use.
Its role is to effectively process business transactions, control industrial processes, support
enterprise communications and collaborations and update corporate database.
The main objective of OSS is to improve the operational efficiency of the enterprise.
These are further categorized as :
CA Clues
Nikhil Gupta
o Process Control System (PCS)
o Enterprise Collaboration System (ECS)
Inputs
This component provides data to TPS for processing. To make a data suitable for
processing it may be a two step process.
i. Collection or Recording : In this data is recorded in to computer for
processing Data collection is also known as Data Capturing.
ii. Classification or Conversion : In this step recorded data is classified as per
the nature of data. Data is normally classified according to its nature as
payment, receipt, sales data etc.
Processing
This component is used to convert the given data to TPS into information.
Processing of data / transaction is done as per the accounting rules or business
logics. Processing uses various activities like sorting, calculation and
summarization to provide the sequenced and summarization to provide the
sequenced and summarized data in the form of journals and ledgers, for providing
various types of financial and operational reports.
In manual TPS, processing may also be known as posting of transactions to
predefined books to journals and ledgers whereas in computer, processing is
used to create transaction and master files.
Storage
CA Clues
Nikhil Gupta
Transaction Files : Transaction files are known as detailed files and keep the
data relating to business transactions. Transaction files are normally of temporary
nature.
Outputs
An information system is developed to produce various types of output/
information. Outputs are also known as objectives of information system.
Outputs from information system are produced in the form reports. Normally
output repots from Accounting TPS can be divided into two categories :
Financial Reports - Financial reports provide summarized information, for
example Balance Sheet and Income Statement
Operational Reports - Operational reports provide day to day detail
operational information, for example daybook etc.
Feature of TPS
efforts.
Its objective is to use IT to enhance the productivity and creativity of teams in enterprises.
CA Clues
Nikhil Gupta
Information
System
Management Oriented :
A good MIS must furnish information to the managers to expand their
knowledgebase.
It is management which uses the MIS for efficient decision making.
Therefore, information provided by MIS should be management oriented.
MIS should not be meant for only top management it should meet the
information needs of all levels of managers.
2.
Management Directed :
MIS is meant for managerial decisions.
Management should be involved in setting the system specifications as well as
in directing changes from time to time in the system. Without the involvement
of management it is very difficult to develop an effective MIS.
3.
Need based :
MIS design and development should be as per the information needs of
managers at different levels.
4.
Exception Based :
MIS should be developed on exceptional based reporting principal, which
means as abnormal situation i.e. maximum, minimum or expected value vary
CA Clues
Nikhil Gupta
from tolerance limit should also be reported. Exception reports help in
efficient decision making.
5.
Integrated :
MIS integrates various subsystems to provide for meaningful information.
Information integration is a key successful business functioning. And MIS to
be effective, it must generate the information keeping all aspects of business
operation. All the functional and operational sub- systems should be linked
together into one unit. This helps in generation of better information.
6.
7.
8.
9.
10.
Computerized :
MIS can be use without the use of computers.
The use of computers increases the effectiveness and efficiency.
2.
CA Clues
Nikhil Gupta
3.
d)
e)
Evaluation of MIS :
A good MIS should meet the information needs of the executive.
And meeting information requirements of executives should be on continuous basis
i.e for future also. This capability can be achieved if MIS is flexible and information
requirement of executive can be achieved by evaluating the MIS and taking timely
actions on feedbacks.
CA Clues
Nikhil Gupta
2.
3.
4.
5.
6.
Limitation of MIS :
1. Quality of output depends on the quality of inputs and processes.
2. MIS can be based on quantitative factor only it does not take into account non- quantitative
factors like human judgments etc.
3. MIS are prepared for various functions like finance, Marketing, Production and personnel
etc.
4. MIS is less useful for non structured decisions.
5. Effectiveness of MIS is decreases if information is not shared within the organization.
CA Clues
Nikhil Gupta
6. MIS generate the information based on internal data only it does not provide information
considering external data.
7. MIS normally provide pre defined periodic reports, exception reports based on internal data
and some management science tools etc, it does not provide ad hoc reports suitable to the
requirement of decision makers.
DSS are mainly used for solution of semi structured and unstructured problem.
DSS helps to solve semi structured and unstructured problems by bringing together human
judgments and computerized information.
DSS are extensively used in financial planning, corporate budgeting and sales forecasting,
etc.
DSS are normally developed as spreadsheets models for problem areas, and provide the
capability of What if analysis that is executing the models for various alternatives to arrive
at correct decisions.
DSS is an interactive, flexible and adaptable Computer Based Information System specially
developed for supporting the solution of non structured management problem for improved
decision making. It uses data, provides easy user interface, and can incorporate the decision
makers own judgment.
DSS uses models, is built by an interactive process ( often by end users ), support all phases
of decision making , and may include a knowledge component.
4.
5.
6.
7.
8.
9.
10.
Components of DSS
DSS is composed of Four basic components :
(1)
User
(2)
Planning language
CA Clues
Nikhil Gupta
(3)
Model base
(4)
Databases
(1) The user : The user of decision support system is usually a manager or analyst with
unstructured or semi structured problem to solve. DSS has two broad classes of users.
(a) Managers
(b) Staff Specialist (Analysts)
(2) Planning Language : The user communicates with and commands the DSS through
Planning Language. User uses two types of planning languages with interface system.
(a) General Purpose Planning Language : This type of Planning language allows
the user to perform routine task for example retrieving data from database etc.
(b) Special Purpose Planning Language : Some specialized software provides these
languages for specialized analysis like SPSS , SAP .
(3) Model Base : Model Base is known brain of DSS because it provide the structure of
problem to be solved. It provide a frame work of problem in the form of a model which
to analyzed problem using data manipulation and computations.
(4) Databases : The DSS includes one or more databases. These databases contain both
internal and external data.
The tools of decision support systems are software for supporting database query, modeling,
data analysis and display. A comprehensive tool kit for DSS would be to support all these
functions.
Database Software : These tools support database query and report generation. By using
database software user can access data from database for internal as well external data
requirement of DSS.
Model Based Software : These software help designer to design model that incorporate
business rules and assumptions. Actually model based software are the most important tool
of DSS. These software support the user with what if Analysis.
Statistical Software : These software are used for statistical analysis and simulation which is
an essential part of business modeling or DSS. These software help in various statistical
analysis like regression, variance analysis etc. SPSS is most popular statistical software in the
market for statistical analysis.
Display Based Software: These software help in displaying the output in presentable form.
This toll mainly helps in showing output in graphical form which can be directly interpreted
by management. Graphic tools for mainframe computers are DISSPLA, TELEGRAF and
SASGRAPH and for microcomputers are HARVARD GRAPHICS etc.
CA Clues
Nikhil Gupta
EIS is an information system that serves the information need of top executives.
EIS enables its users to extract summary data and model complex problems without the need
to learn complex query languages, statistical formulas or high computing skills.
EIS is considered as highly user friendly system because it provides a user friendly graphical
reporting system with drill down capabilities.
EIS is mainly an advancement of MIS but it can include the DSS capabilities to solve
complex problems.
Characteristics of EIS
1. EIS is a computer based information system that serves the information need of top
executives.
2. EIS is very user friendly, supported by graphics and exception reporting and drill down
capabilities.
3. EIS provides rapid access to timely information and direct access to management reports.
4. EIS is capable of accessing both internal data and external data.
5. EIS is easily connected to Internet EIS can easily be given a DSS support for decision
making.
1.
2.
3.
4.
The computer based document management systems capture the information contained in
documents, stored it for future reference.
Stored document is available to the users as and when required.
It is very useful in remote access of documents that is almost impossible with manual document
management systems.
Example :- text processors, electronic message communication systems etc.
Business enterprises have been using a variety of communication systems for finding and receiving
CA Clues
Nikhil Gupta
Teleconferencing is conducted in a business meeting involving more than two persons located at two
or more different places.
The teleconferencing helps in reducing the time and cost of meeting as the participants do not have
to travel to attend the meeting.
Teleconferencing may be audio or video conferencing with or without use of computer systems.
Text processing systems are the most commonly used components of the OAS.
Text processing systems automate the process of development of documents such as letters, reports,
memos etc.
They permit use of standard stored information to produce personalized documents.
Automation reduces keying effort and minimizes the chances of errors in the document.
There exists other categories of information systems also that support either operations or
management applications.
Other information system are: Expert Systems
Knowledge Management Systems
Functional Business Information Systems
Strategic Information Systems and Cross
Functional Information Systems
1. Expert Systems
Expert system is a computer based information system which provides the advices or solutions of given
problems, just like the human experts. Expert system works on the principle of Artificial Intelligence to solve
complex and unstructured problems normally in a narrow area like audit etc, just like the human experts. Expert
systems are also knowledge based systems, because these systems contain the knowledge of experts in an
organized and structured manners to solve the problems.
Expert System is a system that allows a person not having any specialized knowledge or experience
to make a decision.
They contain the knowledge used by an expert in a specific field in the form If/The rules and an
engine capable of drawing inferences from this knowledge base.
CA Clues
Nikhil Gupta
It helps to process the information required to access the problem/ decision- making situation and
express conclusion with a reasonable degree of confidence.
Expert System (ES) provide several levels of expertise.
Expert system can be example based, rule based and frame based for providing problem solution or
advice.
In example based expert system it searches the appropriate match for present problem or case with
previous cases with previous cases and their solution from knowledge base. In rule base it uses if then
else rules for serried of question from users to draw conclusion for problem solution. In frame base
Expert System it divided every data, processes etc into logically linked units called frames to create
the most logical solution.
Expert System provides various level of expertise like Assistant Level: Provide user attention on
problem area Colebee Level: Discuss the problem with user at arrive at agreement. True Expert: User
accepts the solution without any question. (Very difficult to develop)
Expert System provides problem solution or provides advice like Human experts.
Costly and complex system to develop and also it takes lots of time to develop expert system.
It is difficult to obtain the knowledge of experts in terms of how they specify a problem and how they
take decision.
CA Clues
Nikhil Gupta
It is also difficult to develop the programs to obtained knowledge of experts for problem and their
solution.
Doctors use expert system to diagnose the patient dieses by providing symptoms of dieses to expert
system.
Indian Revenue Department uses Tax Expert System to investigate tax evasion and frauds on the
basis of providing tax returns details.
These are knowledge based systems that support the conception, association and propagation of
business knowledge within the enterprise.
These systems supports the operational and managerial applications of the basic enterprises of an
industry.
These systems provide an industry strategic products, services and capabilities for competitive
advantage.
It is also known as integrated information system that combines most of information systems.
It is designed to produce information and support decision making for different levels of management
and business functions.
2.3.7.
2.3.8. Information as a Key Business Asset and its Relation to Business Objectives
and Processes
Information is a strategic resource that helps enterprises in achieving long term objectives and
goals.
In todays competitive and unpredictable business environment, only those enterprises
survive, which have complete information and knowledge of customer buying habits and
market strategy.
Information management enhances an organization ability and capacity to deal with and achieve its
mission by meeting challenges of competition, timely performance and change management.
CA Clues
Nikhil Gupta
This is critical as the managed information and knowledge enables the enterprise to deal with
dynamic challenges and effectively envision and create their future.
This requires coordination between people, processes and technology.
Operational Functions
Production
Finance
Marketing
The grouping or clustering of several functional units on the basis of related activities into a
sub system is termed as operational function.
Different operational functions need different kind of information in terms of their content
and characteristics.
CA Clues
Nikhil Gupta
We know management is divided normally into three broad categories and it is know as
levels of management.
Interaction of the Three Levels of Management
Top management establishes the policies, plans and objectives of company, as well as
general budget framework under which various departments will operate.
These factors are passed down to middle management where they translated into specific
revenue, cost and profit goals. These are reviewed, analyzed and modified in accordance with
the overall plans and policies; middle management then issue specific schedules and
measurement specifications to operational management.
The operational level has the job of producing the goods and services required to meet the
revenue and profit goals which in turn will enable the company to reach its overall plan and
objectives.
In general, the management levels are divided into following three categories along with
their information requirements:
2.5.
At this level managers co-ordinate the work of others who are not managers, to
ensure effective and efficient execution of work.
This is the lowest level in management hierarchy. At this level day to day business
operations are performed.
Nature of information Required :- Regular ; Specific; Accurate ; Simple ; Internal ;
Reliable ; Complete ; Historical.
The accounting information system comprises of the processes, procedures, and systems that
capture accounting data from business processes.
CA Clues
Nikhil Gupta
System record the accounting data in the appropriate records and process the detailed accounting
data by classifying, summarizing.
TPS
MIS
Focus
Data
Transactions
Information
Decisions
No Decisions
Structured
routines
problems using
Conventional
Management
Science tools
Type of
Information
Summary
reports,
operational
reports
Scheduled and
Demand
reports,
structured
reports,
DSS
Decisions,
Flexibility,User
Friendliness
Semi
structured
Problems,
Integrated
Management
Science Models,
blend of
Judgment
Information to
support specific
Decisions
EIS
Tracking,Control
i.e Monitoring
Only when
Combined with
DSS
Status access,
exception
reporting, key
indicators
CA Clues
Nikhil Gupta
exception
reporting
Highest
organization
Level served
Sub
managerial,
Low level
Management
Middle
Management
Analyst and
Managers
Question section
Q.1. Short notes:-
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
ix.
x.
xi.
xii.
xiii.
xiv.
xv.
Senior Executive
Only
CA Clues
Nikhil Gupta
CHAPTER-3
Protection of Information Systems
3.1.
Information System
In the computerized information systems, most of the business processes are automated.
Organizations are increasingly relying on Information Technology for information and transaction
processing.
IT innovations such as hardware, software, networking technology, communication technology etc.
The above gaps indicate that there are always emerging new risks areas
that could have significant impacts on critical business operations such as:
(a)
(b)
(c)
External dangers from hackers, leading to denial of service and virus attack, extortion
and leakage of corporate confidential information
Growing potential for misuse and abuse of information system affecting privacy and
ethical values
Dangers to information system availability and robustness
Information security refers to the protection of valuable assets against loss, disclosure, or damage.
Securing valuable assets from threats, sabotage, or natural disaster with physical safeguards such as
locks, perimeter fences, and insurance is commonly understood and implemented by most of the
organizations.
Security must be expanded to include logical and other technical safeguards such as user identifiers,
passwords, firewalls, etc.
The data or information is protected against harm from threats that will lead to its loss, inaccessibility,
alteration, or wrongful disclosure.
The protection is achieved through a layered series of technological and non-technological
CA Clues
Nikhil Gupta
3.2.1.
The objective of information system security is the protection of the interests of those relying on
information, and protect the information systems and communications that deliver the information
from harm resulting from failures of confidentiality, integrity, and availability.
Every organization, the security objective comprises three universally accepted attributes:
Confidentiality : Prevention of the unauthorized disclosure of information
Integrity : Prevention of the unauthorized modification of information
Availability : Prevention of the unauthorized withholding of information.
Procedures are more detailed steps to be followed to accomplish particular security related tasks.
Standards, guidelines, and procedures should be promulgated throughout an organization through handbooks
or manuals.
CA Clues
Nikhil Gupta
Reasons why information security is important to the organization, and its goals and principles.
3.4.5.
Controls are known as checks or management tools which are implemented to ensure that
process or system will work as per its intended purpose. And controls are used everywhere in
the business organizations. We all know that businesses are highly dependent on Information
Technology (IT) systems for their day to day working, due to extensive use of IT systems
today.
Therefore, it is important that controls should be in place for IT systems so that the IT
systems can work error free and as per the requirements.
IT controls are specific IT processes designed to support an overall business process. Figure
below presents the components and processes of IT department; and controls are applied to
these components and processes.
The increasing use of IT in organizations has made it imperative that appropriate information systems
CA Clues
Nikhil Gupta
General Controls are those controls that are applicable to overall systems components,
processes, and data for a given organization or systems environment. This includes controls
over such areas as the data centre and network operations, systems development and
acquisition, system change and maintenance, access, and computer processing.
Application controls are those controls that are applicable to individual accounting
subsystems, such as payroll or accounts payable. These types of controls are primarily
applicable to the processing of individual applications and ensure that transactions are
authorized and correctly recorded; and processing is complete and accurate.
3.5.2.
1.
2.
3.
4.
CA Clues
Nikhil Gupta
a.
b.
c.
d.
e.
f.
g.
There is large difference between internal control environment and types of internal controls
used in computerized system compare to manual system.
An internal control environment is derived through followings in both manual and
computerized system
Personnel : By setting appropriate controls and standards for personnel to carry out jobs
based on their competencies and skill
Segregation of duties: A key control in financial system which means that processing of
transactions is split between different people from beginning to end.
Authorization procedures : Controls setup to ensure that transactions are approved and
authorized
Record Keeping: Controls setup to maintain the records in books and storage.
Access to assets and records : Controls set up for access of resources and data
Management supervision and review: Controls setup by management for supervision and
review.
Concentration of Programs and data : Transaction and master file data may be stored in a
computer readable form on one computer installation or on a number of distributed
installations.
CA Clues
Nikhil Gupta
a.
b.
The aim of information system control is to ensure business objectives are achieved,
undesired risk are detected, and there after prevented and corrected. That is to provide
reliable, error free and efficient information system.
This is achieved by designing an effective Information control framework, which contains
policies, procedures , processes and organization structure that gives reasonable assurance
that the business objectives will be achieved.
Objective of Controls
The objective of controls is to reduce or if possible eliminate the causes of the exposure to potential
loss. Exposures are potential losses due to threats materializing. All exposures have causes. Some
categories of exposures are: Errors or omissions in data, procedure, processing, judgment and
comparison; Improper authorizations and improper accountability with regards to procedures
processing, judgment and comparison; and Inefficient activity in procedures, processing and
comparison.
Some of the critical control lacking in a computerized environment are:
Lack of management understanding of IS risks and related controls.
Absence or inadequate IS control framework
Absence of weak general controls and IS controls
Lack of awareness a knowledge of IS risks and controls amongst the business users
Objective of controls
Nature of IS resource
Internal Accounting
Preventive
Environmental
Detective
Physical Access
Corrective
Compensatory
Compensatory
Functional Nature
Operational
Administrative
Logical Access
IS Operational
IS Management
SDLC
CA Clues
Nikhil Gupta
i.
ii.
iii.
iv.
Preventive Controls
Detective Controls
Corrective Controls
Compensatory Controls
Auditors Categories of Controls
Detective
Controls
Preventive
Controls
Corrective
Controls
Compensatory
Controls
Preventive Controls :
Preventive controls are those inputs, which are designed to prevent an error, omission or malicious
act occurring.
1.
2.
3.
Preventive controls are implemented for both computerized and manual environment; but
techniques and implementation may differ depending upon the type of threats and exposure.
Examples of preventive controls.
Employ qualified personnel
Id Passwords
Access controls
Segregation of duties
Proper Documentation
Authorization of transactions
Validation of transactions
Firewalls
Anti virus software
Vaccination against diseases,
Documentation,
Prescribing appropriate books for a course,
Training and retraining of staff,
Detective Controls:
CA Clues
Nikhil Gupta
Detective controls are designed to detect errors, omissions or malicious acts that occur and report
the occurrence.
An example of a detective control is regular reporting of expenditures statement to management
1.
2.
3.
Corrective controls:
Corrective controls are designed to reduce the impact of error or malicious activities by
correcting the error and avoiding the malicious activities occurrence in futures, for example,
backup procedure, etc
Corrective controls may include the use of default dates on invoices where an operator has tried to
1.
Minimize the impact of threats or problems
2.
Rectify the problem
3.
Modify the processing system to minimize the future occurrence of problems
Examples of corrective controls
i.
Backup
ii.
Recovery procedures
iii.
Contingency planning
iv.
Setting up corrective procedures for problems
v.
Change of control procedures or inputs to avoid occurrence of problems in future
Investigate budget variance and report violations.
vi.
Compensatory Controls:
Controls are basically designed to reduce the probability of threats, which can exploit the
Sometime, organizations due to financial and operational constraints can not implement
appropriate preventive controls.
While designing the appropriate control one thing should be kept in mind the cost of the lock should
not be more than the cost of the assets it protects.
In such cases, there are controls which are not preventive controls of the assets to be
CA Clues
Nikhil Gupta
protected but indirectly those controls help to protect assets. Such indirect controls are called
compensatory controls,
for example, Strong user controls can help to reduce data processing errors and frauds, etc.
Here strong user controls are administrative controls for increasing efficiency of
organizations but these indirectly help to avoid various threats to different assets.
iii.
iv.
v.
vi.
Another classification of controls is based on the nature of IS resources. These are given as follows:
Environmental controls: These are the controls relating to IT environment such as power,
air-conditioning, UPS, smoke detection, fire-extinguishers, dehumidifiers etc.
Physical Access Controls: These are the controls relating to physical security of the tangible IS
resources and intangible resources stored on tangible media etc. Such controls include Access
control doors, Security guards, door alarms, restricted entry to secure areas, visitor logged access,
CCTV monitoring etc.
Logical Access Controls: These are the controls relating to logical access to information resources
such as operating systems controls, application software boundary controls, networking controls,
access to database objects, encryption controls etc.
IS Operational Controls : These are the controls relating to IS operation, administration and its
management such as day begin and day end controls, IS infrastructure management, Helpdesk
operations etc.
IS Management Controls: These are the controls relating to IS management, administration,
policies, procedures, standards and practices, monitoring of IS operations, Steering committee etc.
SDLC Controls: These are the controls relating to planning, design, development, testing,
implementation and post implementation, change management of changes to application,other
software and operations.
Another category of controls is based on their functional nature. When reviewing a clients control
systems, the auditor will be able to identify three components of internal control. Each component is
aimed at achieving different objectives.
These controls are given as follows:
ii.
iii.
CA Clues
iv.
v.
vi.
vii.
viii.
ix.
Nikhil Gupta
transactions for settlement of transactions processed and reconciliation of the applications to general
ledger.
Data Processing Environment Controls- These controls are related to hardware and software
and include procedures exercised in the IS environment. This includes on-line transaction systems,
database administration, media library, application program change control, the data center.
Physical Access Controls :- These Physical security and access controls should address
supporting services (such as electric power), backup media and any other elements required for the
systems operation.
Logical Access Controls :- Logical access controls are implemented to ensure that access to
systems, data and programs is restricted to authorized users so as to safeguard information against
unauthorized use, disclosure or modification, damage or loss.
SDLC (System Development Life Cycle) Controls :- These are functions and activities generally
performed manually that control the development of application systems, either through in-house
design and programming or package purchase.
Application Control Techniques:- These include the programmatic routines within the application
program code. The objective of application controls is to ensure that data remains complete, accurate
and valid during its input, update and storage.
Business Continuity Planning (BCP) Controls:- These controls are related to having an
operational and tested IT continuity plan, which is in line with the overall business continuity plan, and
its related business requirements so as to make sure IT services are available as required and to
ensure a minimum impact on business in the event of a major disruption.
Audit trails are used as detective controls. Audit trails are log that can be designed to record
the user activities on system and application. Audit trails provide an important detective
control which help to accomplish security policy. In this control, log files are created by
system ( operating system) which maintain details of user activities on system
CA Clues
Nikhil Gupta
Application system controls are undertaken to accomplish reliable information processing cycles that
perform the processes across the enterprise.
Applications represent the interface between the user and the business functions.
From the point of view of users, it is the applications that drive the business logic.
The following lists the user controls that are to be exercised for system effectiveness and efficiency.
CONTROLS
BOUNDARY
CONTROLS
SCOPE
INPUT
CONTROLS
PROCESSING
CONTROLS
OUTPUT
CONTROLS
DATABASE
CONTROLS
1.
2. Passwords:
User identification by an authentication mechanism with personal characteristics like name, birth date,
employee code, function, designation or a combination of two or more of these can be used as a
password boundary access control.
PIN is similar to a password assigned to a user by an institution a random number stored in its
database independent to a user identification details, or a customer selected number.
CA Clues
Nikhil Gupta
4. Biometric Devices:
Biometric identification e.g. thumb and/or finger impression, eye retina etc. are also used as boundary
control techniques.
Classification of Information
1. Top Secret :
This is highly sensitive information, it includes, primarily, top management strategic plan
e.g. mergers or acquisitions; investment strategies and product designs etc.
This type of information requires the highest possible level of security / controls
2. Highly Confidential:
This type of information, if made public or even shared around the organization, can
seriously affect the organizations operations, and is considered critical to its ongoing
operations.
This information includes accounting information, business plans and information of
customers product / tasks specifications, etc.
This type of information requires very high level of security / controls
3. Proprietary:
This type of information includes processes and procedures for organization day to day
operations e.g. product designs and specifications, product manufacturing and quality control
procedures etc
This type of information requires very high level of security / controls
4. Internal Use only:
This type of information is not approved for general circulation outside the organization.
Such information loss can cause inconvenience to the organization or management, but
information disclosure is unlikely to result in financial loss or serious damage to credibility
of organization Example of this type of information would include, internal memos, minutes
of meetings, internal project reports.
This type of information requires very high level of security / controls
5. Public Documents:
Information in the public domain; annual reports, press statements etc; which has been
approved for public use.
This type of information requires very high level of security / controls
CA Clues
3.9.1. Data Integrity:
Nikhil Gupta
Once the information is classified, the organization has to decide about various data integrity
controls to be implemented.
The primary objective of data integrity control techniques is to prevent, detect, and correct
errors in transactions as they flow through the various stages of data processing.
Data integrity controls protect data from accidental or malicious alteration or destruction and
provide assurance to the user that the information meets expectations about is quality and
integrity.
There are six important data integrity controls:
Controls over Data Integrity
Source Data
Controls
Input Validation
Routines
Online Data
Entry
Data Processing
And Storage
Output
Controls
Data
Transmission
Source data are major cause of errors and frauds in any accounting system.
Controls must be applied in system which uses source documents to input transaction to
ensure error free inputs to system.
Organization must implement control procedure over source document to avoid any
document fraud.
Threats:
o Incomplete or Inaccurate source data input.
Examples:o Good form design
o Segregation of duties
o Check digit verification
When we input text characters in amount field then computer provide you the message;
invalid data. That is due to validation controls for inputs.
validations controls to avoid acceptance of invalid inputs by information system.
Threats: Invalid or inaccurate data in computer-processed transaction files
Examples:- edit checks, sequence, validity, range , limit etc.
Online data inputs system such as ATM and Net Banking, etc.
Threats: Incorrect and unauthorized transactions input through online terminals
Examples :o User ID Password controls
o Edit check
o Limits check
o Range check
CA Clues
Nikhil Gupta
The incorrect processing of data, incorrect data storage and data storage destruction can
result in serious damage to organization credibility and can cause huge economic losses.
Threats: Inaccurate or Incomplete data in computer- processed master files
Examples:o Monitoring data entry by data control personnel
o Reconciliation of system updates with control accounts
o Exception reports
o Conversion controls
5. Output Controls:
Output controls ensure that the system output is not lost, misdirected, or corrupted and
privacy is not lost.
Threats: Incomplete or inaccurate computer output
Examples :
i.
Printed outputs
ii. Visual or online outputs
iii. Secure storage & distribution of outputs error or exception reports
Data transmission or use of networks has become an integral part of information system for
efficient working of organizations.
Threats: unauthorized access to data moving on a network or to the system itself, network or
to the system itself, network system failures/errors.
Examples :
o Data Encryption
o Network Monitoring
o Maintaining standby
o backup equipment to recover from network failures
o Use id / password to allow access to authorized users only.
o Regular audit
o Firewall
2. Offsite Backup Storage Backups older than one month must be sent offsite for permanent
storage.
3. Software Testing All software must be tested in a suitable test environment before installation on
production systems.
4. Virus- Signature Updating- Virus signatures must be updated automatically when they are made
available from the vendor through enabling of automatic updates.
5. Environment Divisions The division of environments into Development, Test, and Production is
required for critical systems.
6. Quarter-end & Year-end backups it must be done separately from the normal schedule ,
CA Clues
Nikhil Gupta
The protection of data against accidental or intentional disclosure to unauthorized persons as well as
the prevention of unauthorized modification and deletion of the data.
Multiple levels of data security are necessary in an information system environment; they include
o database protection,
o data integrity,
o security of the hardware and software controls,
o physical security over the user
o organizational policies.
An IS auditor is responsible to evaluate the following while reviewing the adequacy of data security
controls:
o Who is responsible for the accuracy of the data?
o Who is permitted to update data?
o Who is permitted to read and use the data?
o Who controls the security of the data?
o Who is responsible for determining who can read and update the data?
Access of information system and its resources should be to authorize users only.
Access of resources to authorized users should be as per their rights and responsibilities.
It is very important that information system should be protected from unauthorized access
both directly or physically and through programs or logically.
Information system and its resources can have two types of access:
1) Logical Access: It is access of resources through programs or applications
2) Physical Access: It is physical or direct access of information system resources like access to
hard disk, tape and other disk devices, etc which can have precious information.
Based on the type of access mentioned above there are two types of access
controls
Access control
CA Clues
Nikhil Gupta
Logical Access
Paths
Issues and
Revelations
Logical Access
Violators
Logical Access
Controls and
Mechanisms
Audit of
Logical Access
Controls
CA Clues
2.
3.
4.
5.
Nikhil Gupta
Asynchronous Exposures
Computer Crime exposures
Remote and distributed data processing applications
Physical and Environmental protection
1. Technical Exposures:
Trojan Horse: These are spy program and provide secret information like id, password to its
owner, who later misuse this information
Logic Bomb: It is a destructive program, such as virus that is triggered by some
predetermined events.
Time Bomb: programmers can install time bombs in their program to disable the software
upon a predetermined date.
Round Down: In this programmers and executers put some instructions in the program
which round off the interest money in authorized accounts and this rounded off money is
credited in false accounts and in organization like banks this rounded off money some time
runs in millions.
Worms: Worms are malware that self-propagates. A worm is a memory destructive program,
worm is a piece of code just like virus.
Data Diddling: it refers to the alteration of existing data. Changing data before, during or /
and after it enter into the system with malicious intentions.
Salami Techniques : it is used for the commission of financial crimes. This involves slicing
of small amounts of money from a computerized transaction or account and is similar to the
rounding down technique.
Trap Doors: A Trap Door is a mechanism to get into system. It is a software that allows
unauthorized access to system without going through normal login procedure.
o
o
o
o
CA Clues
Nikhil Gupta
o Legal Issues: The organizations will be exposed to lawsuits from customers due to access
violations, and particularly when there are not proper security measures. Therefore IS auditor
should take legal counsel while reviewing the issues associated with computer security.
o Loss of Credibility or Competitive Edge: Company may gain a bad name if customers
data / funds are manipulated.
o Blackmail / Industrial Espionage By knowing the confidential information, the perpetrator
can obtain money from the organization by threatening and exploiting the confidential
information.
o Disclosure of Confidential, Sensitive or Embarrassing Information : Disclosure of
information can spoil the reputation of the organization and individual and may invite legal
or regulatory actions against organizations.
o Sabotage: People who may not be interested in financial gain but who want to spoil the
credibility of the company may involve in such activities. They do it because of their dislike
towards the organization.
CA Clues
Nikhil Gupta
Using Firewall
Using Network Monitoring, etc
Application software
Data
Data dictionary / directory
Dial up lines
Program Libraries
Logging files
Password files
Password library
Procedure libraries
Spooling queues
System software
Backup files
Telecommunication lines
Temporary disk files
CA Clues
Nikhil Gupta
Accidental Ignorant
Employees experiencing financial
Former employee
Discontented
Addicted to a substance or gambling
Employee notified for their termination
Employees on strike
Employees threatened by disciplinary action or dismissal
Interested or informed outsiders
Access control mechanisms allow the entry of authorized users only to the system. The
mechanism processes the users request for resources in there steps.
Identification
Authentication
Authorization
Physical access controls are designed to protect the organization from unauthorized access or
we can say, to prevent illegal entry.
Following are some common physical access controls:
1. Locks on Doors
Cipher locks ( Combination Door Locks ) also known as programmable locks.
they are keyless and use keypads for entering a pin number.
Bolting Door Locks A special metal key is used to gain entry.
Electronic Door Locks known as smart card operated door. It is used with a sensor
reader to gain physical access.
Biometric door locks they use human characteristic as the key to the door such as
voice, fingerprint, face detection , signature etc.
2. Physical Identification Medium
Personal Identification numbers ( PIN) If user inserts a card and enters a PIN, if
the code will be match then entry will be permitted. It is just like ATM card and PIN.
Plastic cards used for identification purpose.
CA Clues
Nikhil Gupta
3. Logging of Access
Manual Logging All visitors should be prompted to sign a visitors log indicating
CA Clues
Nikhil Gupta
Ventilation systems
It provide a safe environment for personnel & equipment. Environmental exposures are
primarily due to elements of nature, However, with proper controls, exposure to rudiments
can be reduced.
Environmental exposures are:
Fire Damage : the most common risk to any facility
Water Damage / flooding even with facilities located on upper floors of high
buildings. Water damage is a risk, usually from broken water pipes.
Power spike
Electrical Shock
Natural disasters earthquake , volcano, hurricane, tornado
Equipment failure
Air Conditioning failure
Bomb threat / attack
Controls for Environmental Exposures:
Hand Held fire Extinguishers
Manual Fire Alarms
Smoke Detectors
Fire Suppression Systems
Dry Pipe sprinkling systems
Regular Inspection by fire Department
Fireproof Walls, Floors and Ceilings
Wiring Placed in Electrical Panels and Conduit
Strategically Locating the Computer Room
Electrical Surge Protectors
Uninterruptible Power Supply ( UPS) / Generator
Power Leads from Two Substations
Emergency Power Off Switch
Controls from Pollution Damage
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
CHAPTER-4
Business Continuity Planning And
Disaster Recovery Planning
BCM is a very effective management process to help enterprises to manage the disruption of all
kinds, providing counter measures to safeguard from the incident of disruption of all kinds. Business
continuity means maintaining the uninterrupted availability of all key business resources required to
support essential business activities.
BCM ensure continuity of services and operations, an enterprise shall adapt and follow well-defined
and time-tested plans and procedures.
BCM build the redundancy in teams and infrastructure, manage a quick and efficient transition to the
backup arrangement for business systems and services.
CA Clues
Nikhil Gupta
BCM testing, maintenance and audit testing in the enterprise BCM to prove the extent to
which its strategies and plans are complete
A BCP tested periodically because there will be no doubt in the plan and its implementation.
The BCM maintenance process demonstrates the documented evidence of the proactive
management and governance of the enterprises business continuity program.
BCP is a guiding document that allows management team to continue operations in the event
of some type of disaster.
The goal of a BCP is to ensure that the business will continue to operate before, throughout
and after a disaster event.
It provide a long term strategy for ensuring the continued successful operation of an
organization.
It defines the plans to avoid crises and disasters, and if crises or disasters occur then it define
for immediate recovery from these crises and disasters.
BCP define steps, plans and procedure for continuance of business activities irrespective of
CA Clues
Nikhil Gupta
any situation.
procedures to be followed before, during and after an event that severely disrupts all or part of the
business operations.
Successful organizations have a comprehensive BCP Manual, which ensures process readiness,
data and system availability to ensure business continuity.
BCP provide reasonable assurance to senior management of enterprise about the capability of the
enterprise to recover from any unexpected incident or disaster affecting business operations and
continue to provide services with minimal impact.
The BCP Manual is expected to specify the responsibilities of the BCM team, whose mission is to
establish appropriate BCP procedures to ensure the continuity of enterprise's critical business
functions.
3.
Primary Objective
Key Objective
Primary Objective of BCP is organization enables to survive in disaster.
Key Objectives of BCP is continue essential business operations, safety of people at the time of
disaster, minimize immediate damages and loses etc.
Plan Development
Testing Program
Maintenance Program
Plan Testing and Plan Implementation
CA Clues
Nikhil Gupta
In this phase , a profile is developed that indicates recovery strategy to support critical
business processes.
This profile should include:
Hardware
Software
Documentation
Outside support
Personnel for each business unit
Facilities
CA Clues
Nikhil Gupta
The methodology for developing a BCP can be sub-divided into eight different phases.
Understand the total efforts required to develop and maintain an effective recovery plan;
Obtaining commitment from appropriate management to support and participate in the effort;
Defining recovery requirements from the perspective of business functions
Documenting the impact of an extended loss to operations and key business functions;
Focus on disaster prevention and impact minimization, as well as orderly recovery;
Selecting business continuity teams that ensure the proper balance required for plan
development;
Developing a BCP that is understandable, easy to use and maintain;
Integrate BCP into ongoing business planning and system development processes in order
that the plan remains viable overtime.
4.5.Types of Plans
There are various kinds of plans that need to be designed. These plans include the following plan:
1. Emergency Plan
In emergency plan the actions to be taken immediately when a disaster occurs. Management
must identify those situations that require the plan to be invoked.
Example : major fire
major structural damage
terrorist attack.
The actions are depending on the nature of the disaster occurs.
2. Back-up Plan
In backup plan, the type of backup to be kept:
frequency with which backup is to be taken
procedures for making backup
CA Clues
Nikhil Gupta
3. Recovery Plan
Recovery plans set out procedures to restore full information system capabilities.
Recovery plan identify a recovery committee who will be responsible for working out the specifics of
4. Test Plan
The final and last component of a disaster recovery plan is a test plan.
The purpose of the test plan is to identify the weakness in the emergency, backup, or recovery plans.
They also identify in the preparedness of an organization and its personnel for facing a disaster.
4.6. Backup
It is a utility program.
If original database is destroyed then same can be restored with the backup of that database.
It is create for security purpose
1. Online back up
2. Offline backup
Performed when the database is shutdown or the system is not used by user.
3. Live backup
Performed by using the backup utility with the command line option.
It is an advance form of online backup.
4. Full backup
For a full backup, the database backup utility copies the database and log.
A full backup captures all files on the disk or within the folder selected for backup
5. Incremental backup
An incremental backup captures files that were created or changed since the last backup,
CA Clues
Nikhil Gupta
By performing an incremental backup the mirror log is not backed up.
6. Differential Backup:
A differential backup stores files that have changed since the last full backup.
Differential backup is faster and more economical in using the backup space.
7. Mirror back-up:
A mirror backup is identical to a full backup, with the exception that the files are not
1.
2.
3.
4.
5.
They can be either share (sharing server equipment or dedicated own server).
(iii) Hot site
If fast recovery is critical, an organisation need hot site backup.
Hot sites are fully equipped with equipment and resources to recover business functions.
Most robust disaster recovery technique
Most expensive but provide almost zero downtime.
(iv) Reciprocal agreement:
When Two or more organisations agree to provide backup facilities to each other when one suffering
the disaster.
This backup option is relatively cheap, but each participant must maintain sufficient capacity to
operate anothers critical system.
CA Clues
Nikhil Gupta
Disaster recovery is a complex and large process and it include various plans such as;
Emergency Plan
Recovery Plan
Test Plan
Disaster Recovery Procedural Plan is a document which includes all the procedures to follow
for disaster recovery.
Disaster Recovery Procedure Plan is known as DRP document or DRP manual listing
everything about DRP such as;
Emergency procedures, which describe the actions to be taken at the time of incident
Fall back procedures or back up procedures describe the action to be taken to move
essential services to some other place
Awareness and education to staff and management for business continuity activities
List of vendors or supplier with their contact numbers and addresses for emergency
purpose
Emergency phone no. of fire dept, police, hospital and backup locations, etc.
Find out whether a disaster recovery / business resumption plan exists or not, if it exists
then was this developed using a reliable / sound methodology?
Review the BIA ( Business Impact Analysis ) study, which is the basis of developing DRP;
in terms of its appropriateness
CA Clues
Nikhil Gupta
Review the Test Plan and also verify the extent to which DRP has been tested
Review that plan is regularly tested and have the lasted features to it
Obtain and Review the actual test results
Review who all participated in BIA study and DRP preparation; in terms of their
experience, qualifications, etc.
Determine whether required training has been provided to personnel responsible for disaster
recover / business resumption process.
Determine DRP include name of personnel and others responsible ( supplier, service
providers) with their telephone numbers
Q.8.
CA Clues
Nikhil Gupta
CHAPTER-5
Acquisition, Development and Implementation of Information Systems
(SDLC)
Systems development is the process of examining a business situation with the intent of improving it
through better procedures and methods.
System development has two main components: System Analysis
System Design
System Analysis is the process of collecting facts, diagnosing problems and use the information to
solve the problems. System analysts understand the existing system and the future needs and
recommend the alternatives for improving the system.
System Design is the process of planning a new or improved system. System designer , design the
blue print which specifies all the features.
Reasons for failure to achieve systems development objectives are following:1. User Related Issues- It refers to the issues where the user is reckoned as the primary agent.
Some user related problems are:o Shifting user needs
o Resistance to change
o Lack of user participation
o Inadequate testing and user training
2. Developer Related Issues- It refers to the issues and challenges with regard to the
developers. Some developer related problems are:o Lack of standard project management and system development
methodologies
o Overworked or under-trained development staff
3. Management Related Issues- It refers to the issues of organizational set up and overall
management to accomplish the system development goals. Some management related
problems are:o Lack of senior management support and involvement
o Development of strategic systems
4. New Technologies- when organizations deploy new but complex technology, users are not
able to run the system.
CA Clues
Nikhil Gupta
Many people in the organization who are responsible for system development these peoples
called system development team. System development team consist of :i.
Steering Committee
ii. Project management team
iii. System Analysts
iv.
System Designers
v.
End-Users
Diagram
Strength:
Progress of system development is measurable.
It enables to conserve resources.
It is ideal for supporting less experienced project teams and project managers or project
Weakness:
It is criticized to be Inflexible, slow, costly, and cumbersome due to significant structure and tight
controls.
Project progresses forward, with only slight movement backward.
It depends upon early identification and specification of requirements, even if the users may not be
able to clearly define what they need early in the project.
Requirement inconsistencies, missing system components and unexpected development needs are
often discovered during design and coding.
CA Clues
Nikhil Gupta
Prototyping approach is to develop a small or pilot version called a prototype of part or all of a
system. A prototype is a usable system or system component that is built quickly and at a lesser cost,
and with the intention of modifying/replicating/expanding or even replacing it by a full-scale and fully
operational system.
It is a working model of the proposed system. It is based on the simple ideas that the people
can express more easily what they like or do not like about an actual working system.
A prototype model suggests that before development of actual software, a working prototype
of the system should be built first. A prototype is toy implementation of system, usually
exhibiting limited functional capabilities, low reliability, and inefficient performance.
Strength / Merit
It improves both user participation in system development and communication among project
stakeholders.
It is very useful for resolving unclear objectives
It helps to easily identify, confusing or difficult functions and missing functionality.
It generate specifications for a production system.
It encourages innovation and flexible designs.
It provides for quick implementation of an incomplete, but functional, application.
A very short time period is normally required to develop and start experimenting with a prototype.
Weakness / Demerit
Requirements may frequently change significantly.
Non-functional elements is difficult to document.
Prototype may not have sufficient checks and balances incorporated.
Prototyping can only be successful if the system users are want to devote significant time in
experiments with the prototype.
The interactive process of prototyping causes the prototype to be experimented with quite
extensively.
Inadequate testing can make the approved system error-prone.
Inadequate documentation makes this system difficult to maintain.
CA Clues
5.
Nikhil Gupta
Prototype model help in examining the technical issues associated with product
development
4.
Strength / Merit
Stakeholders can be given concrete evidence of project status throughout the life cycle.
It is more flexible and less costly to change scope and requirements.
It helps to mitigate integration and architectural risks earlier in the project.
It allows the delivery of a series of implementations that are gradually more complete.
System can goes into production more quickly as incremental releases.
Gradual implementation provides the ability to monitor the effect of incremental Changes
Helps to mitigate integration and architectural risks earlier in the project.
Weaknesses / Demerit
Each phase of an iteration is rigid and do not overlap each other.
lack of overall consideration of the business problem and technical requirements for the overall
system.
Problems may arise pertaining to system architecture
Some modules are completed much earlier than others, well-defined interfaces are required.
It is difficult to demonstrate early success to management.
Strength / Merit
CA Clues
Nikhil Gupta
It enhances the risk avoidance.
It is useful in helping for optimal development of a given software iteration based on project
risk.
Weakness / Demerit
It is difficult to determine the exact composition of development methodologies to use for
RAD is assigned new tools and techniques, which are intended to speed up the development
process.
It is a system development approach designed to give much faster development and higher
quality results than those achieved with the traditional approach.
The customer or user is heavily involved in the process.
The key features of this approach can be described as low cost, quick and right quality.
Strength / merit
Weakness / Demerit
High speed and lower cost may affect to a lower overall system quality.
lead to inconsistent designs within and across systems.
It may call for lack of attention to later system administration needs built into system.
Formal reviews and audits are more difficult to implement than for a complete system.
Potential for violation of programming standards.
CA Clues
Nikhil Gupta
RAD Components
Joint Application Development (JAD)
Rapidity of development
Clean rooms
Time Boxing
Incremental prototyping
Main Features:
Customer satisfaction by rapid delivery of useful software
Working software is delivered frequently
Working software is the principal measure of progress
Close, daily co-operation between business people and developers
Face-to-face conversation is the best form of communication.
Projects are built around motivated individuals, who should be trusted.
Continuous attention to technical excellence and good design.
Simplicity
Self-organizing teams
Regular adaptation to changing circumstances.
Sustainable development, able to maintain a constant pace
Strengths / merit:
Flexible to handle variations
Handle dynamism by avoiding wastage of effort.
An adaptive team, which enables to respond to the changing requirements.
Team does not have to invest time and efforts
Face to face communication and continuous inputs from customer representative leaves
Weakness / demerit
In case of large organisations, it is difficult to assess the efforts required at the beginning of the
software development life cycle.
Lack of emphasis on necessary designing and documentation.
Agile increases potential threats to business continuity and knowledge transfer.
Agile requires more re-work and due to the lack of long-term planning and the lightweight approach to
architecture, re-work is often required on Agile projects when the various components of the software
are combined and forced to interact.
The project can easily get taken off track if the customer representative is not clear about the final
CA Clues
Nikhil Gupta
SDLC is set of activities carried out by System Analysts, Designers and user to develop
and implement system.
It consists of a generic sequence of steps or phases in which each phase of the SDLC uses the
results of the previous one.
The SDLC can also be viewed from a more process oriented perspective.
From the perspective of the IS Audit, the possible advantages are following:
The IS auditor can have clear understanding of various phases of the SDLC on the basis
of the detailed documentation.
The IS Auditor on the basis of his/her examination, can state in his/her report about the
compliance by the IS management of the procedures, if any, set by the management.
The IS Auditor has a technical knowledge and ability of different areas of SDLC, can
be a guide during the various phases of SDLC.
The IS auditor can provide an evaluation of the methods and techniques used through
the various development phases of the SDLC.
5.4.3. Some of the shortcomings risks are associated with the SDLC are as following:
The development team may find it cumbersome.
The users may find that the end product is not visible for a long time.
The rigidity of the approach may prolong the duration of many projects.
IT may not be suitable for small and medium sized projects.
5.4.4. Six activities of System Development Life Cycle [ Memory code: FADDTIM ]
1.
Feasibility study ( Preliminary Investigation )
2.
Analysis ( System Requirement Analysis )
3.
Design ( System Design )
4.
i) Acquisition (System Acquisition)
ii) Development ( System Development )
5.
Testing ( System Testing )
6.
Implementation (System Implementation)
7.
Maintenance
CA Clues
Nikhil Gupta
Identification of Problem.
Identification of Objectives.
Delineation of Scope.
Feasibility Study.
Identification of Objective- After identification of the problem, it is easy to work out and
precisely specify the objectives of the proposed solution.
Delineation of Scope
After problems & opportunities are identified then the analyst must determine the project
scope like:
Functionality requirement
Control requirements
Performance requirements
Time
Money requirement
Interfaces
Other resources required.
Feasibility Study:
A feasibility study is carried out by the system analysts, which refers to a process of evaluating
alternative systems through cost/benefit analysis so that the most feasible and desirable system can
be selected for development.
The Feasibility Study of a system is evaluated under following dimensions described briefly as
follows:
o Technical: Is the technology needed available?
o Financial: Is the solution viable financially?
o Economic: Return on Investment?
o Schedule/Time: Can the system be delivered on time?
o Resources: Are human resources reluctant for the solution?
o Operational: How will the solution work?
o Legal: Is the solution valid in legal terms?
CA Clues
Nikhil Gupta
2. Economic Feasibility: Cost Benefit analysis involves an overall evaluation of all expected incremental costs and
benefits on implementation of proposed system.
Cost Benefit Analysis:
Development Costs:
Salaries of analysts and programmers
Converting and preparing data files
Cost of Preparing computer facilities
Testing and documenting.
Training and other startup costs.
Operational Costs Hardware / software rental charges
Salaries or Computer Operators
Salaries of System Analysts
Input data preparation & control
Data processing supplies
Maintaining physical facilities
Overhead charges.
Intangible Costs loss of employee productivity
Decreased customer sales
Loss of goodwill
3.
4.
5.
Operational Feasibility: - It is a measure of how well the solution will work in the
organization. Obtain the views of employees, customers and suppliers since
technically and economically feasible system may fail due to human behavioral
problems. So in this feasibility, satisfaction level of management, users, operators,
customers and suppliers is considered.
Schedule Feasibility: - Design team estimates time required for system operation and
communicate it to Steering Committee. Steering Committee will analyze alternatives
and select one with less implementation time. It is a measure of how reasonable the
project timetable.
Legal Feasibility:- It involves determining how the project will comply with legal
obligation of the organization.
CA Clues
6.
Nikhil Gupta
7.
Financial Feasibility: Solution proposed may be prohibitively costly for the user
organization.
Resource Feasibility: Focuses on human resources, Implementation difficulty in
non- metro location
5.7.1. Mainly The following activities are carried out for this phase :
1.
2.
3.
4.
Collection of information
Analysis of present system
Analysis of proposed system
Preparing the management report
(iii)
Documents : In this analyst collect all the documents used by users for the existing
system
Questionnaires : In this Users and Managers are asked various questions regarding the
problem with existing system and requirement from the new system.
Interviews : Users and managers are interviewed to collect the information in depth and
in exact form.
CA Clues
(iv)
Nikhil Gupta
Data files- Investigate Date Files, Systems and Procedures Manual, One-line and offline files, Cost of retrieving and processing.
Methods, procedures and Data communications:- Method and Procedure are the
business logics which transform inputs into outputs. This is a very crucial analysis,
which provide the understanding of functional aspects of various business processes.
Physical and logical system- Document, logical flow, Diagrams, Data Dictionary.
(3)
Many tools and techniques are there which help the system analyst to visualize,
document, analyze and design new system in a faster and easier manner.
Help to improve existing system and to develop new ones.
Conceptualize activities and resources,
Analyze present business operations,
Propose and design new or improved information systems.
CA Clues
Nikhil Gupta
Categories of Tools
1. System Component & Flows: These tools help the system analysts to document the
data flow among the major resources and activities of an information system.
Design Phase of System Development deals with transforming the customer requirements as
described in Requirement Specification Document into a form implement able using a
programming language.
This phase start after the system analysis phase is over, in other words, the output of the
system analysis phase, i.e. requirement specifications becomes an input to the design phase.
System Design is considered one of the most crucial and core phase of System Development
because success of system developed depend upon good system design.
CA Clues
Nikhil Gupta
Architectural Design;
Design of Data /Information Flow
Design of Database
Design of User-interface
Physical Design
Design and acquisition of the hardware/system software platform'
The design of the data and information flow is a major step in the conceptual design of the new
system.
In designing the data / information flow for the proposed system, the inputs that are required are existing data / information flows, problems with the present system, and objective of the new system.
Design of the database involves determining its scope ranging from local to global structure.
The scope is decided on the basis of interdependence among organizational units. The design of the
database involves four major activities,
For the physical design, the logical design is transformed into units, which is further decomposed
into implementation units such as programs and modules.
During physical design, The designers follow some type of structured approach like CASE tools to
access their relative performance via simulations when they undertake physical design. Some of the
issues addressed here are type of hardware for client application and server application, Operating
systems to be used, type of networking, processing batch online, real time; frequency of input,
output.
After a system is designed either partially or fully, the next phase of the systems development
starts, which relates to the acquisition of operating infrastructure including hardware, software
and services.
Acquisitions are highly technical and cannot be taken easily and for granted.
CA Clues
5.9.1.
5.9.2.
I.
Nikhil Gupta
Acquisition Standards:
It is important for the Management to establish acquisition standards that address the security and
reliability issues have been considered in development of the system to be acquired.
Acquisition standards should focus on the following:
o Ensuring security, reliability, and functionality already built into a product;
o Ensuring managers complete appropriate vendor, contract, and licensing reviews and
acquiring products compatible with existing systems
o Invitations-to-tender involves soliciting bids from vendors when acquiring hardware or
integrated systems of hardware and software.
o Request-for-proposals involves soliciting bids when acquiring off-the-shelf or third-party
developed software
o Establishing acquisition standards to ensure functional, security, and operational
requirements to be accurately identified and clearly detailed in request-for-proposals.
Acquiring Systems Components from Vendors:
Hardware Acquisition In case of procuring items such machinery as machine tools, transportation equipment, air
II.
Software Acquisition
III.
Once user output and input requirements are finalized, the nature of the application software
requirements must be assessed by the systems analyst.
This helps the systems development team to decide what type of application software products is
needed and consequently, the degree of processing that the system needs to handle.
At this stage, the system developers must determine whether the application software should be
created in-house or acquired from a vendor.
IV.
Contracts between an organization and a software vendor should clearly describe the rights and
responsibilities of the parties to the contract. The contracts should be in writing with sufficient detail to
provide assurances for performance, source code accessibility, software and data security, and other
important issues.
Software license grants permission to do things with computer software.
The usual goal is to authorize activities, which are prohibited by default by copyright law, patent law,
trademark law and any other intellectual property rights.
Copyright laws protect proprietary as well as open-source software. The use of unlicensed software
or violations of a licensing agreement expose organizations to possible litigation.
CA Clues
Nikhil Gupta
Vendor Support.
II.
III.
Benchmarking test :
These are sample programs that represent at least a part of the buyers primary work load
and include considerations and can be current applications that have been designed to
represent planned processing needs.
That is, benchmarking problems are oriented towards testing whether a solution offered by
the vendor meets the requirements of the job on hand of the buyer.
IV.
Testing Problems:
Test problems disregard the actual job mix and are devised to test the true capabilities of the
hardware, software or system.
At the end of the design stage the organization has a good idea about type of hardware and
software required for system. Hardware can be acquired through buying, hiring etc. As
regards of software there are two options build it or buy it.
Software development is also known as programming process because ultimately software is
made with many programs. Software development is not a simple job, It require lot of
planning and thinking for any application development.
Reliability: It refers to the consistency with which a program operates over a period of time.
Robustness: It refers to the applications strength to uphold its operations in adverse situations by
taking into account all possible inputs and outputs of a program in case of least likely situations.
Accuracy: It refers not only to what program is supposed to do, but should also take care of what it
should not do. The second part becomes more challenging for quality control personnel and auditors.
Efficiency: It refers to the performance per unit cost with respect to relevant parameters and it should
not be unduly affected with the increase in input values.
Usability: It refers to a user-friendly interface and easy-to-understand documents.
Readability: It refers to the ease of maintenance of program even in the absence of the program
developer.
CA Clues
Nikhil Gupta
The graphical layout or design prepared for programs in the design step is not executable on
computer system.
It is program code, which can be executed on computer.
For each language, there are specific rules concerning format and syntax. Syntax means
vocabulary, punctuation and grammatical rules available in the language manuals that the
programmer has to follow strictly and pedantically.
Coding standards minimize the system development setbacks due to programmer turnover.
Coding standards provide simplicity, interoperability, compatibility, efficient utilization of
resources and least processing time.
So these logical layouts are converted into program code by computer programmer by using
any particular language like BASIC , COBOL, C , JAVA etc.
CA Clues
Nikhil Gupta
a.
b.
c.
d.
e.
In this method of testing the correctness of a particular module of source code is tested.
This type of testing is mostly done by the developers.
A unit is the smallest testable part of an application, which may be an individual program, function,
procedure, etc.
There are five categories of tests that a programmer typically performs on a program unit:Functional Tests: It check whether programs do, what they are supposed to do or not. It validates
the program against a checklist of requirement. The test plan specifies operating conditions, input
values, and expected results, and as per this plan, programmer checks by inputting the values to see
whether the actual result and expected result match.
Performance Tests: It verify the response time, the execution time, the throughput, primary and
secondary memory utilization and the traffic rates on data channels and communication links.
Stress Tests: Stress testing is a form of testing that is used to determine the stability of a given
system or entity. Main purpose of stress testing is to find defects in the system capacity of handling
large numbers of transactions during peak periods.
Structural Tests: Structural Tests are concerned with examining the internal processing logic of a
software system.
Parallel Tests: In Parallel Tests, the same test data is used in the new and old system and the output
results are then compared. Conducting redundant processing to ensure that the new version or
application performs correctly.
CA Clues
Nikhil Gupta
code. it is conducted on source programs and do not normally require executions in operating
conditions. Typical static analysis techniques include the following:
o Desk Check: This is done by the programmer. Programmer checks the logical syntax errors,
and deviation from coding standards.
o Structured Walk Through: The application developer leads other programmers to scan the
text of the program and explanation to uncover errors.
o Code examination: The program is reviewed by a formal committee. Review is done with
formal checklists.
ii.
Dynamic Testing: Such testing is normally conducted through execution of programs in operating
conditions. three techniques for dynamic testing and analysis include the following:
o Black Box Testing: it examines the program from a user perspective by providing a wide
variety of input scenarios and inspecting the output. It attempts to derive sets of inputs that
will fully exercise all the functional requirements of a system. This to find errors like incorrect
or missing function, errors in data structures, performance errors, etc.
o White Box Testing: It is a test case design method that uses the control structure of the
procedural design to derive test cases. It verifies inner program logic. It uses an internal
perspective of the system to design test cases based on internal structure. It requires
programming skills to identify all paths through the software. It is used for unit testing of selfdeveloped software.
o Gray Box Testing: It is a combination of black box testing and white box testing. In gray box
testing, the tester applies a limited number of test cases to the internal workings of the
software under test.
Integration testing is an activity of software testing in which individual software modules are combined
and tested as a group.
It occurs after unit testing and before system testing
An objective is to evaluate the validity of connection of two or more components that pass information
from one area to another.
This is carried out in the following two manners:
o Bottom-up Integration: the bottom level modules are tested first. It is the traditional strategy
used to integrate the components of a software system into a functioning whole. Bottom-up
testing is easy to implement as at the time of module testing, tested subordinate modules are
available.
o Top-down Integration: the top level modules are tested first. It starts with the main routine,
and stubs are substituted, for the modules directly subordinate to the main module.
o Regression Testing: Each time a new module is added as part of integration testing the
software changes. the regression tests ensure that changes or corrections have not
introduced new faults. The data used for the regression tests should be the same as the data
used in the original test. It is used when there is high risk that the new changes may affect
the unchanged areas of application system.
It is a process in which software and other system elements are tested as a whole.
System testing begins either when the software as a whole is operational or when the well-defined
subsets of the software's functionality have been implemented.
The purpose is to ensure that the new or modified system functions properly.
These test procedures are often performed in a non-production test environment.
The types of testing that might be carried out are as follows:
o Recovery Testing: it is the activity of testing how well the application is able recover from
crashes, hardware failures and other similar problems.
o Security Testing: This is the process to determine that an Information System protects data
and maintains functionality as intended or not. This testing technique also ensures the
CA Clues
Nikhil Gupta
It is conducted when the system is just ready for implementation. During this testing, it is ensured that
the new system satisfies the quality standards adopted by the business and the system satisfies the
users.
Thus, the final acceptance testing has two major parts:
o Quality Assurance Testing: It ensures that the new system satisfies the prescribed quality
standards and the development process is as per the organizations quality assurance policy,
methodology.
o User Acceptance Testing: It ensures that the functional aspects expected by the users have
been well addressed in the new system. There are two types of the user acceptance testing
described as follows:
Alpha Testing: This is the first stage, often performed by the users within the
organization by the developers, to improve and ensure the quality/functionalities as
per users satisfaction.
Beta Testing: This is the second stage, generally performed after the deployment of
the system. It is performed by the external users, during the real life execution of the
project.
CA Clues
o
o
o
o
o
Nikhil Gupta
The new system may be totally new, replacing an existing manual or automatic system or it may be a
major modification in an existing system.
Some of the generic key activities involved in System Implementation include the following:
Conversion of data to the new system files;
Training of end users;
Completion of user documentation;
System changeover; and
Evaluation of the system a regular intervals.
Equipment Installation
Training personnel
Conversion procedures
System Implementation Activities
Equipment
Installation
Training personal
Conversion
procedures
In this procured hardware is installed in the Organization for use of developed and acquires
software.
The following steps are involved in Equipment Installation.
Equipment Installation Activities
Site Preparation
i.
Equipment installation
(hardware/software)
Checkout
Equipments
Site preparation :
An appropriate location as prescribed must be found to provide an operating environment
for the equipment that will meet the vendor's temperature, humidity and dust control
specifications etc.
CA Clues
Nikhil Gupta
specification provided in layout i.e furniture, wiring, air conditions etc are
installed.
ii.
iii.
Check Equipments :
The equipment must be turned on for testing under normal operating conditions
Installed equipments are checked for proper working like turning on / off, booting of
computers and communication channels working etc.
various routine test and diagnostic routine are carried out for testing the equipments installed.
5.12.2.Training personnel :
Training is an important aspect for effective utilization of installed system. Even a good
developed system can fail if it is not operated and used in proper manner.
Whenever a new system is installed in the organization, a need of training arises for both
general users and computer professional as the new system often contain some new types of
hardware and software.
Normally two types of training are provided for new system
Training to system Operators ( i.e. to Computer Professionals )
Training to End User ( i.e. to General User )
This involves the activities carried out for successful conversion from old system to new
system.
Following activities are carried out for conversion from old system to new system.
(i)
Procedures Conversion :
o Every system has its own procedure etc for input data preparation, output
generation, controls etc.
o Therefore for implementation of new system the procedure, methods for
working on new system must be clearly defined and converted from old
procedure and methods to as per the requirement of new system.
(ii)
File Conversion :
o The old data files should be converted to as per the requirement of new
system and these conversion should be done before the system is
implemented.
o Data file conversion is one of the most important task and it should be
done with utmost care. And old file should also be kept for some time if
any bug is detected later on in new converted data files same can be
rectified.
(iii)
CA Clues
Nikhil Gupta
o After data files are converted from old system to new system and system
components are properly in place, users in organization should start
working on new system.
o If required for some time old system may be continuous for verification
purpose.
(iv)
(v)
Conversion
Strategies
Direct
Implementation
Or
Abrupt changeover
Parallel
Implementation
Phased
Implementation
Pilot
Implementation
Advantages :
CA Clues
Nikhil Gupta
(b) Low cost.
Disadvantages:
Advantages :
Disadvantages :
CA Clues
o
o
Nikhil Gupta
Evaluate the effectiveness & efficiency of the live system.
Analyze lessons learned.
Development Evaluation
Operation Evaluation
Information Evaluation
(i) Development Evaluation : This evaluation is done to check whether system developed is on
schedule and with in the budget.
(ii) Operation Evaluation : This evaluation includes the operational aspects of developed system.
(iii) Information Evaluation : This evaluation is related to find our the value of information that
developed system is providing to user or to find out how the information provided by system is
changing the quality of decision making of users
Rescue Maintenance : Is regarding errors / situations which were not anticipated but which
have arisen now and require immediate solution like breakdown of a system due t hard disk
crashing require Rescue maintenance operation ex. Recovering data from crashed hard disk
and putting new hard disk in use.
CA Clues
Nikhil Gupta
Q.2
Ans.
Q.3.
Ans.
Q.4.
Ans.
Ans.[Refer- 5.2]
Ans.[Refer- 5.3.3]
Ans.[Refer- 5.3.5]
Ans.[Refer- 5.3.6]
Ans.[Refer- 5.4]
System Analysis
Ans.[Refer- 5.7]
Program Debugging
Ans.[Refer- 5.10.4]
Integration Testing
Ans.[Refer- 5.11.3]
Final Acceptance Testing Ans.[Refer- 5.11.5]
Q.5.
Q.6
Ans.
Q.8
Ans.
Q.9
Ans.
What is feasibility study ? Explain the various types of feasibilities studies carried out in
Preliminary Investigation.
[Refer- 5.6]
CA Clues
Nikhil Gupta
Q.10
Ans.
Q.11
What is System Analysis ? Explain the various tasks performed in system analysis or
requirement analysis phase of system development
[Refer- 5.7]
Ans.
Q.15
Ans.
Q.16
Ans.
Ans.
[Refer- 5.10.1]
Q.18. Briefly describe the type of activities used in successful system Implementation.
Ans.
[Refer- 5.12]
Q.19. explain the Different levels of Testing.
Ans.
[Refer- 5.11.1]
Q.20
Ans.
CA Clues
Nikhil Gupta
CHAPTER -6
AUDITING & INFORMATION SYSTEMS
6.1. Information System Audit
The first business software applications were mostly in the domain of finance and accounting. The
numbers from paper statements and receipts were entered into the computer, which would perform
calculations and create reports. Computers were audited using sampling techniques. An auditor
would collect the original paper statements and receipts, manually perform the calculations used to
create each report, and compare the results of the manual calculation with those generated by the
computer.
As computers became more sophisticated, auditors recognized that they had fewer and fewer
findings related to the correctness of calculations and more and more on the side of unauthorized
access. Moreover, the checks and balances that were devised to maintain correctness of calculations
were implemented as software change control measures. Nowadays, information systems audit
seems almost synonymous with information security control testing.
The IS Audit of an Information System environment may include - Assessment of internal controls
within the IS environment to assure validity, reliability, and security of information and information
systems.
6.1.2.
CA Clues
Nikhil Gupta
o
o
6.1.7.
Functions of IS Auditor
Inadequate information security controls (e.g. missing or out of date antivirus controls, open systems
CA Clues
Nikhil Gupta
I.
II.
III.
IV.
V.
VI.
Scoping ( pre-audit survey) - Determine the main area of focus. It include background reading and
web browsing, previous audit reports, pre audit interview, observations.
Planning (preparation)- Involving the generation of an audit work plan or risk-control-matrix.
Fieldwork - Gathering evidence by interviewing staff and managers, reviewing documents, and
observing processes etc.
Analysis - SWOT (Strengths, Weaknesses, Opportunities, Threats ) or PEST (Political, Economic,
Social, Technological) techniques can be used for analysis.
Reporting - Reporting to the management is done after analysis of evidence gathered and analyzed
Closure ( follow-up ) - Closure involves preparing notes for future audits and follow up with
management to complete the actions they promised after previous audits.
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
6.5.
6.5.1.
performed, relevant audit evidence obtained, and conclusions the auditor reached. The
objects of an auditors working papers are to record and demonstrate the audit work from one
year to another.
Evidences are also necessary for the following purposes:
o Means of controlling current audit work
o Evidence of audit work performed
o Schedules supporting or additional item in the accounts
o Information about the business being audited, including the recent history.
Documentation by Auditor
To prepare proper report, auditor needs documented evidences.
The problem of documents not available in physical form has been highlighted at many places.
i.
ii.
i.
ii.
iii.
iv.
v.
Audit trails are logs that can be designed to record activity at the system, application, and user level.
When properly implemented, audit trails provide an important detective control to help accomplish
security policy objectives.
Audit trail controls attempt to ensure that a chronological record of all events that have occurred in a
system is maintained. The accounting audit trail shows the source and nature of data and processes
that update the database. The operations audit trail maintains a record of attempted or actual
resource consumption within a system.
Audit Trail Objectives: Audit trails can be used to support security objectives in three ways:
o Detecting unauthorized access to the system
o Facilitating the reconstruction of events
o Promoting personal accountability.
Implementing an Audit Trail: The information contained in audit logs is useful to accountants in
measuring the potential damage and financial loss associated with application errors, abuse of
CA Clues
Nikhil Gupta
o Schedule Jobs Every organization gives priorities to different works and they
can determine the sequence in which they want the job to be managed.
o Manage hardware & Software Resources The programs required by the users
gets loaded in the primary storage & then caused the various hardware units to
perform as specified by the program.
o Maintain System Security A password is created for every user to ensure that
unauthorized person are denied access to data in the system
o Enable multiple User Resource sharing Many users can share the programs at
the same time.
o Handling Interrupts It is technique used by the operating system to temporarily
suspend processing of one program & enable the other program to be executed
o Maintain Usage Records This is useful in companies where the usage of system
by various departments have to be recorded and also charged sometimes
Operating Systems being one of most critical software of any computer need to work in a well
controlled environment. Following are the major control objectives:
o OS Protect itself from user;
o OS Protect user from each other;
o OS Protect user from themselves;
o OS Protected from itself
o OS Protected from its environment.
Operating system security involves policy, procedure and controls that determine, who can access
the operating system, which resources they can access, and what action they can take. The
following security components are found in secure operating system:
o Log-in Procedure: A log-in procedure is the first line of defense against unauthorized access.
o Access Token: Operating System creates an access token that contains key information
about the user including user-id, password, user group and privileges granted to the user.
o Access Control List: This list contains information that defines the access privileges for all
valid users of the resource.
o Discretionary Access Control: The system administrator usually determines; who is granted
access to specific resources and maintains the access control list.
following can be used as remedies from destructive programs like viruses, warms etc.:
o Purchase software from reputed vendor;
CA Clues
o
o
o
o
o
Nikhil Gupta
Maintenance activities should be given essentially the same treatment as new development.
When maintenance cause extensive changes to program logic, additional control should be invoke,
such as involvement by the auditor and the implementation of user test and acceptance procedure.
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
6.6.8.
o Personal computers are small in size and easy to connect and disconnect.
o It can be shifted from one location to another or even taken outside the organization for theft
o of information.
o Pen drives can be very conveniently transported from one place to another, as a result of
o
6.7 Audit and Evaluation Techniques for Physical and Environmental Controls
6.7.1 Role of IS Auditor in Physical Access Controls
Auditing physical access requires the auditor to review the physical access risk and controls to form
an opinion on the effectiveness of the physical access controls. This involves the following:
Risk Assessment
Controls Assessment
Review of Documents
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
ISACA
CA Clues
Nikhil Gupta
Chapter- 7
Information Technology Regulatory Issues
7.1 IT Act
IT Act was enacted on 17th May 2000 primarily to provide legal recognition for electronic transactions
and facilitate e-commerce. India became the 12th nation in the world to adopt cyber laws by passing
the Act.
IT Act, 2000 was introduced, it was the first information technology legislation introduced in India.
The IT Act is based on Model law on e-commerce adopted by UNCITRAL of United Nations
organization.
The IT Act was amended by passing of the Information Technology (Amendment) Act 2008 (Effective
from October 27, 2009).The amended Act casts responsibility on body corporate to protect sensitive
personal information (Sec. 43A). It recognizes and punishes offences by companies and individual
(employee) actions (Sec. 43, 66 to 66F, 67..) such as sending offensive messages using electronic
medium or using body corporate IT for unacceptable purposes, stealing computer resources,
unauthorized access to computer resources, identity theft/cheating by personating using computer,
violation of privacy, cyber terrorism, offences using computer and publishing or transmitting obscene
material.
To enable
Electronic governance
To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers Book Evidence Act,
1891, and the Reserve Bank of India Act, 1934.
CA Clues
Nikhil Gupta
To provide for
Data security and privacy
"Addressee" means a person who is intended by the originator to receive the electronic record but
does not include any intermediary.
"Adjudicating Officer" means adjudicating officer appointed under subsection (1) of section 46;
"Affixing Electronic Signature" with its grammatical variations and cognate expressions means
adoption of any methodology or procedure by a person for the purpose of authenticating an
electronic record by means of Electronic Signature;
asymmetric crypto system means a system consisting of secure key pair, private key and
public key to verify the digital signature;
"Certifying Authority" means a person who has been granted a license to issue a Electronic
Signature Certificate under section 24;
"Certification Practice Statement" means a statement issued by a Certifying Authority to specify the
practices that the Certifying Authority employs in issuing Electronic Signature Certificates;
o "Communication Device" means Cell Phones, Personal Digital Assistance or combination of
both or any other device used to communicate, send or transmit any text, video, audio, or
image.
"Computer" means any electronic, magnetic, optical or other high-speed data processing device or
system which performs logical, arithmetic, and memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all input, output, processing, storage, computer software,
or communication facilities which are connected or related to the computer in a computer system or
computer network;
"Computer System" means a device or collection of devices, including input and output support
devices and excluding calculators which are not programmable and capable of being used in
conjunction with external files, which contain computer programmes, electronic instructions, input
data, and output data, that performs logic, arithmetic, data storage and retrieval, communication
control and other functions.
"Controller" means the Controller of Certifying Authorities appointed under sub-section (7) of
section17;
CA Clues
Nikhil Gupta
"Cyber Appellate Tribunal" means the Cyber Appellate * Tribunal established under sub-section (1) of
section 48
o Cyber Caf means any facility from where access to the internet is offered by any person in
the ordinary course of business to the members of the public.
"Cyber Security" means protecting information, equipment, devices, computer, computer
resource, communication device and information stored therein from unauthorized access,
use, disclosure, disruption, modification or destruction.
"Data" means a representation of information, knowledge, facts, concepts or instructions which are
being prepared or have been prepared in a formalized manner, and is intended to be processed, is
being processed or has been processed in a computer system or computer network and may be in
any form (including computer printouts magnetic or optical storage media, punched cards, punched
tapes) or stored internally in the memory of the computer;
"Digital Signature Certificate" means a Digital Signature Certificate issued under sub-section (4) of
section 35;
"Electronic Form" with reference to information means any information generated, sent, received or
stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or
similar device;
"Information" includes data, message, text, images, sound, voice, codes, computer programmes,
software and databases or micro film or computer generated micro fiche
"Key Pair", in an asymmetric crypto system, means a private key and its mathematically related public
key, which are so related that the public key can verify a digital signature created by the private key;
"Law" includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the
President or a Governor, as the case may be. Regulations made by the President under article 240,
Bills enacted as President's Act under sub-clause (a) of clause (1) of article 357 of the Constitution
and includes rules, regulations, bye-laws and orders issued or made there under
o secure system means computer system which is secure from unauthorized access
and misuse.
o "Security Procedure" means the security procedure prescribed under section16 by the
Central Government;
o "Subscriber" means a person in whose name the Electronic Signature Certificate is issued;
o "Verify" in relation to a digital signature, electronic record or public key, with its grammatical
CA Clues
Nikhil Gupta
variations and cognate expressions means to determine whether
the initial electronic record was affixed with the digital signature by the use of private
key corresponding to the public key of the subscriber;
the initial electronic record is retained intact or has been altered since such electronic
record was so affixed with the digital signature.
CA Clues
Nikhil Gupta
Section -6 Electronic Governance Foundation : Provide that filing of any form,
application etc to govt. dept. can be done through electronic mean, and similarly govt.
dept. can issue or grant any license, permit etc through electronic means.
Section 7 Retention of records in Electronic form : Specify way the field
electronic documents to be retained in database so that same can be easily tracked and
accessed.
Section 8 Audit Documents etc in Electronic Form : Provide for publications
of rules, regulations, notification etc in the Electronic Gazette.
Section 9 : Specify that Govt. Dept can not insist on filing documents in electronic
form only, if it violates certain rights.
Section 10 Power to Central Government to make Rules : It also specify the
power of Central Govt to make rules from time to time in respect of Digital Signature
etc like type of digital signature, manner and format, procedure for affixing the digital
signature etc
Section 10A validity of contracts formed through electronic means:
contract shall remain valid even if following are expressed in electronic form or by
means of electronic records
i.
Communication of proposal
ii. Acceptance of proposal
iii. Revocation of proposal and acceptance
7.6. [CHAPTER V]
SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES
Section 14 Secure Electronic Record : It provides where any security procedure has been applied
to an electronic record at a specific point of time, then such record shall be deemed to be a secure
electronic record from such point of time to the time of verification.
Section 15 Secure Electronic Signature : It provides for the security procedure to be applied to
Digital Signatures for being treated as a secure digital signature.
An electronic signature shall be deemed to be a secure electronic signature if The signature creation data, at the time of affixing signature, was under the exclusive control
of signatory and no other person
The signature creation data was stored and affixed in such exclusive manner as may be
prescribed.
Explanation - In case of digital signature, the "signature creation data" means the private key
of the subscriber
Section 16 Security Procedures and Practices : It provides for the power of the Central
Government to prescribe the security procedure in respect of secure electronic records and secure
digital signatures. In doing so, the Central Government shall take into account various factors like
CA Clues
Nikhil Gupta
nature of the transaction, level of sophistication of the technological capacity of the parties, availability
and cost of alternative procedures, volume of similar transactions entered into by other parties etc.
Section 17- Appointment of controller and other officers to regulate certifying authorities.
Section 18- Functions which the controller may perform in respect of activities of certifying
authorities.
Section 19- Power of the controller with previous approval of the central government to
grant recognition to foreign certifying authorities.
Section 20- Omitted vide IT Act,2008
Section 21- Form , fees and other document to be submitted by a certifying authority, to
apply for the issue of the license to Issue DSC, by the controller.
Section 22- the application for license shall be accompanied practice statement and statement
including the procedure with respect to identification of the applicant and fees not exceeding
Rs.25,000.
Section 23- the application for renewal of a license.
Section 24- the procedure for grant or rejection of license after giving the applicant a
reasonable opportunity of being heard.
Chapter IX contains sections 43 to 47. It provides for awarding compensation or damages for certain
types of computer frauds. It also provides for the appointment of Adjudication Officer for holding an
inquiry in relation to certain computer crimes and for awarding compensation. Sections 43 to 45 deal
with different nature of penalties.
These sections provide the penalties which an adjudicating officer can impose on damage of
computer or computer network like for
o Copy or extract any data from database without permission
o Unauthorized access and downloading
o Introduction of virus
o Damage to computer system and computer network
CA Clues
o
o
o
o
Nikhil Gupta
Disruption of computer, compute network
Denial to authorized person to access computer
Providing assistance to any person to facilitate unauthorized access to computer
Charging the service availed by a person to an account of another person by tampering
and manipulation of other compute etc.
Section 43 deals with penalty for damage to computer, computer system, etc
Section 44 Penalty for failure to furnish information, return, etc.
Section 45 provides for residuary penalty. Whoever contravenes any rules or regulations made under
this Act, for the contravention of which no penalty has been separately provided, shall be liable to pay
a compensation not exceeding twenty-five thousand rupees to the person affected by such
contravention or a penalty not exceeding twenty-five thousand rupees.
7.11. [CHAPTER X]
CYBER APPELLATE TRIBUNAL
CA Clues
Nikhil Gupta
It provides the power of various government bodies for making rules, amendment and other
provisions for Cyber Laws.
Section 80- Power of police officer and other officer to enter, search etc.
Notwithstanding anything contained in the Code of Criminal Procedure, 1973, any police
officer, not below the rank of a Inspector or any other officer of the Central Government or a
State Government authorized by the Central Government in this behalf may enter any public
place and search and arrest without warrant any person found therein who is reasonably
suspected of having committed or of committing or of being about to commit any offence
under this Act
Section 81A- Application of the Act to Electronic cheque and truncated cheque
The provisions of this Act, for the time being in force, shall apply to, or in relation to,
electronic cheques and the truncated cheques subject to such modifications and
amendments as may be necessary for carrying out the purposes of the Negotiable
Instruments Act, 1881 (26 of 1881) by the Central Government, in consultation with the
Reserve Bank of India, by notification in the Official Gazette.
CA Clues
Nikhil Gupta
The Insurance Regulatory and Development Authority of India (IRDA) is the apex body overseeing
the insurance business in India.
It protects the interests of the policyholders, regulates, promotes and ensures orderly growth of the
insurance in India.
Information System Audit has a significant role to play in the emerging Insurance Sector.
Information System Audit aims at providing assurance in respect of Confidentiality, Availability and
Integrity for Information systems. It also looks at their efficiency, effectiveness and responsiveness.
o
o
o
The Reserve Bank of India (RBI) is India's central banking institution, which formulates the monetary
policy with regard to the Indian rupee.
The Bank was constituted for the need of following:
To regulate the issue of banknotes,
To maintain reserves with a view to securing monetary stability, and
To operate the credit and currency system of the country to its advantage
SEBI is the regulator for the securities market in India. SEBI has to be responsive to the needs of
three groups, which constitute the market:
The issuers of securities,
The investors, and
The market intermediaries.
Cyber forensics is one of the latest scientific techniques that has emerged due to the effect of
increasing computer frauds.
Cyber, means on The Net that is online.
Forensics is a scientific method of investigation and analysis techniques to gather, process, interpret,
and to use evidence to provide a conclusive description of activities in a way that is suitable for
presentation in a court of law.
Cyber and Investigation together will conclude that Cyber Investigation is an investigation method
gathering digital evidences to be produced in court of law.
CA Clues
7.17.1
Nikhil Gupta
ISO 27001
ISO 27001 is the international best practice and standard for an Information Security Management
System (ISMS). An ISMS is a systematic approach to managing confidential or sensitive information
so that it remains secure.
7.17.2 SA 402
SA 402 is a revised version of the erstwhile Auditing and Assurance Standard (AAS) 24, "Audit
Considerations Relating to Entities Using Service Organizations" issued by the ICAI in 2002.
This SA is effective for audits of financial statements w.e.f. April 1, 2010.
Information Technology Infrastructure Library (ITIL) is a set of practices for IT Service Management
(ITSM) that focuses on aligning IT services with the needs of business.
ITIL describes the procedures, tasks and checklists that are not organization-specific and it is used
by an organization for establishing a minimum level of competency.
It allows the organization to establish a baseline from which it can plan, implement, and measure. It is
used to demonstrate compliance and to measure improvement.
Questions :
Q.1
i.
ii.
iii.
iv.
Q.2
What is the Scope of IT Act and describe various relevant definitions in it.
Q.3
Q.4
What is Digital Signature? How it is used for the Authentication of Electronic Record.
CA Clues
Nikhil Gupta
CHAPTER- 8
EMERGING TECHNOLOGIES
8.1. Emerging Technologies
Cloud computing simply means the use of computing resources as a service through a real time
communication networks, such as Internet. The Internet is commonly visualized as clouds; hence the
term cloud computing for computation done through the Internet.
With the Cloud Computing, users can access database resources via the Internet from anywhere, for
as long as they need, without worrying about any maintenance or management of actual resources.
Example of cloud computing is Google Apps where any application can be accessed using a browser
and it can be deployed on thousands of computer through the Internet.
CA Clues
Nikhil Gupta
Cloud computing is a combination of software and hardware based computing resources delivered as
a networked service.
This model of IT enabled services enables anytime access to a shared pool of applications and
resources.
Applications and resources can be accessed using a simple front-end interface such as a Web
browser, and as a result enabling users to access the resources from any client device including
notebooks, desktops and mobile devices.
Cloud computing provides the facility to access shared resources and common infrastructure offering
services on demand over the network to perform operations that meet changing business needs
It refers to the components and subcomponents required for cloud computing. These components
typically consist of a front end platform (fat client, thin client, mobile device), back end platforms
(servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). Combined,
these components make up cloud computing architecture.
In cloud computing, protection depends on having the Right Architecture for the Right Application
(RARA). Organizations must understand the individual requirements of their applications, and if
already using a cloud platform, understand the corresponding cloud architecture.
A cloud computing architecture consists of a front end and a back end. They connect to each other
through a network, usually the Internet.
Front End Architecture: Cloud computing architectures consist of front-end platforms called clients
or cloud clients. These clients comprise servers, fat (or thick) clients, thin clients, zero clients ,tablets
and mobile devices. These client platforms interact with the cloud data storage via an application
(middleware), via a web browser, such as Firefox, Microsofts internet explorer or Apples Safari.
Other types of systems have some unique applications which provide network access to its clients.
Back End Architecture: it refers to some service facilitating peripherals. In cloud computing, the
back end is cloud itself, which may encompass various computer machines, data storage systems
and servers. Groups of these clouds make up a whole cloud computing system. It include any type of
web application program such as video games to applications for data processing, software
development and entertainment.
CA Clues
Nikhil Gupta
The cloud computing environment can consist of multiple types of clouds based on their deployment
and usage. Cloud computing environments are briefly described in above figure.
1. Public Clouds: This environment can be used by the general public. It includes individuals,
corporations and other types of organizations. Typically, public clouds are administrated by third
parties or vendors over the Internet, and the services are offered on pay-per-use basis. These are
also called provider clouds. Technically there may be little or no difference between public and private
cloud architecture, however, security consideration may be substantially different for services
(applications, storage, and other resources) that are made available by a service provider for a public
audience and when communication is effected over a non-trusted network. Generally, public cloud
service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and
offer access only via Internet.
It allows the organizations to deliver highly scalable and reliable applications rapidly
and at lowest costs.
Limitation
o Its security assurance and building trust among the clients is far from desired but
slowly liable to happen.
2. Private Clouds: This cloud computing environment resides within the boundaries of an organization
and is used exclusively for the organizations benefits. These are also called internal clouds. Private
cloud is cloud infrastructure operated solely for a single organization, whether managed internally or
by a third-party and hosted internally or externally.
Advantage :
o They improve average server utilization
o allow usage of low-cost servers and hardware while providing higher efficiencies;
3. Hybrid Clouds: it is a combination of two or more clouds (private, community or public) that remain
unique entities but are bound together, offering the benefits of multiple deployment models. A hybrid
cloud service as a cloud computing service that is composed of some combination of private, public
and community cloud services, from different service providers.
CA Clues
Nikhil Gupta
CA Clues
Nikhil Gupta
8.2.6.
IaaS providers offer computers, more often virtual machine and other resources as service. It
provides the infrastructure / storage required to host the services ourselves. IaaS clouds often
offer additional resources such as a virtual-machine
Examples of IaaS : Amazon EC2, Azure Services Platform, Dyn DNS, Google Compute Engine,
HP Cloud, etc.
In the PaaS models, cloud providers deliver a '''computing platform''', typically including
operating system, programming language execution environment, database, and web server.
Application developers can develop and run their software solutions on a cloud platform without
the cost and complexity of buying and managing the underlying hardware and software layers.
With some PaaS offers like Windows Azure, the underlying computer and storage resources
scale automatically to match application demand so that the cloud user does not have to allocate
resources manually. The latter has also been proposed by an architecture aiming to facilitate
real-time in cloud environments.
Examples of PaaS : AWS Elastic Beanstalk, Cloud Foundry, Force.com, EngineYard etc.
A category of cloud services where the capability provided to the cloud service user is to use
network/transport connectivity services and/or inter-cloud network connectivity services. NaaS
involves the optimization of resource allocations by considering network and computing
resources as a unified whole.
Some of the examples are: Virtual Private Network, Mobile Network Virtualization etc.
CA Clues
8.3.
Nikhil Gupta
CaaS is an outsourced enterprise communication solution that can be leased from single
vender.
The CaaS vendor is responsible for all hardware and software management and offers
guaranteed Quality of Service (QoS). It allows businesses to selectively deploy communication
devices and modes on a pay-as-you-go, as-needed basis. This approach eliminates the large
capital investments.
Examples are: Voice over IP (VolP), Instant Messaging (IM), Collaboration and
Videoconferencing application using fixed and mobile devices.
Mobile Computing
Mobile computing is humancomputer interaction by which a computer is expected to be
transported during normal usage.
Mobile computing involves mobile communication, mobile hardware, and mobile software.
Communication issues include ad hoc and infrastructure networks as well as communication
properties, protocols, data formats and concrete technologies.
Hardware includes mobile devices or device components. Mobile software deals with the
characteristics and requirements of mobile applications.
Range & Bandwidth: Mobile Internet access is generally slower than direct cable connections, using
technologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G and 4G networks.
These networks are usually available within range of commercial cell phone towers. Higher
speed wireless LANs are inexpensive but have very limited range.
Security standards: When working mobile, one is dependent on public networks, requiring careful use
of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One
can easily attack the VPN through a huge number of networks interconnected through the line.
Power consumption: When a power outlet or portable generator is not available, mobile computers
must rely entirely on battery power. Combined with the compact size of many mobile devices, this often
means unusually expensive batteries must be used to obtain the necessary battery life.
Transmission interferences: Weather, terrain, and the range from the nearest signal point can all
interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.
Potential health hazards: People who use mobile devices while driving are often distracted from driving
and are thus assumed more likely to be involved in traffic accidents. Cell phones may interfere with
sensitive medical devices. Questions concerning mobile phone radiation and health have been raised.
Human interface with device: Screens and keyboards tend to be small, which may make them hard to
use. Alternate input methods such as speech or handwriting recognition require training.
It enables mobile sales personnel to update work order status in real-time, facilitating
excellent communication.
It facilitates access to corporate services and information at any time, from anywhere.
It provides remote access to the corporate Knowledgebase at the job location.
It enables to improve management effectiveness by enhancing information quality,
information flow, and ability to control a mobile workforce.
phones and laptops for business purposes. It means employees are welcome to use personal
devices (laptops, smart phones, tablets etc.) to connect to the corporate network to access
information and application.
The BYOD policy has rendered the workspaces flexible, empowering employees to be mobile and
CA Clues
Nikhil Gupta
giving them the right to work beyond their required hours. The continuous influx of readily improving
technological devices has led to the mass adoption of smart phones, tablets and laptops, challenging
the long-standing policy of working on company-owned devices.
A set of entities connected with each other on a logical or a physical basis. Physical networks like
computer networks are those that can be planned, implemented and managed very optimally and
efficiently. when we move from physical to logical networks, the visualization becomes much more
difficult. A social network is usually created by a group of individuals, who have a set of common
interests and objectives.
Web 2.0 is the term given to describe a second generation of the World Wide Web that is focused on
the ability for people to collaborate and share information online. Web 2.0 basically refers to the
transition from static HTML Web pages to a more dynamic Web that is more organized and is based
on serving Web applications to users.
The components of Web 2.0 help to create and sustain social.
Green IT refers to the study and practice of establishing / using computers and IT resources in a more
efficient and environmentally friendly and responsible way. Computers consume a lot of natural
resources, from the raw materials needed to manufacture them, the power used to run them, and the
problems of disposing them at the end of their life cycle.
Green computing is the environmentally responsible use of computers and related resources.
One of the earliest initiatives toward green computing in the United States was the voluntary labeling
program known as Energy Star. It was conceived by the Environmental Protection Agency (EPA) in
1992 to promote energy efficiency in hardware of all kinds.
Grid computing requires the use of software that can divide and carve out pieces of a program as one
large system image to several thousand computers.
Grid computing is the collection of computer resources from multiple locations to reach a common
CA Clues
Nikhil Gupta
goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a
large number of files. Grids are often constructed with general-purpose grid middleware software
libraries.
Q.2. What are the goals of Cloud Computing ? ANS. [Refer- 8.2.1]
Q.3. Explain the Architecture Cloud Computing. ANS. [Refer- 8.2.2]
Q.4. Give the advantages & limitation of public cloud. ANS. [Refer- 8.2.4]
Q.5. what are the characteristics Cloud computing
ANS. [Refer- 8.2.5]
Q.6. what are the major Challenges relating to Cloud Computing ANS. [Refer- 8.2.7]