06 October 2018
Paper 6 β Information Systems Control and Audit Chapter β I β Concept of Governance (Average 14 β 20 Marks) ο¨ MAJOR BENEFITS OF GOVERNANCE & IT GOVERNANCE ο¨ KEY GOVERNANCE PRACTICES - RISK MANAGEMENT ο¨ KEY MANAGEMENT PRACTICES - IT EXTERNAL COMPLIANCE ο¨ AREAS OF REVIEW BY INTERNAL AUDITOR AS A PART OF REVIEW OF GRC ο¨ INTERNAL CONTROL AS PER COSO ο¨ KEY MATRIX USED FOR BENEFIT EVALUATION ο¨ KEY BENEFITS OF GEIT ο¨ KEY GOVERNANCE PRACTICES - OF GEIT ο¨ ASSET, VULNERABILITY, THREAT, EXPOSURE, LIKELIHOOD, ATTACK, RISK DEFINITION ο¨ VARIOUS RISK MANAGEMENT STRATEGIES ο¨ COBIT 5 β BENEFITS ο¨ COBIT 5 - SEVEN ENABLERS ο¨ COBIT 5 β COMPONENTS Chapter β II β Information systems concepts (Average 12 β 18 Marks) ο¨ IMPORTANT CHARACTERISTICS OF CBIS ο¨ INFORMATION SYSTEM ATTRIBUTES ο¨ TPS β KEY ACTIVITIES, COMPONENTS, BASIC FEATURES ο¨ MIS β MAJOR CHARACTERISTICS ο¨ MIS β MAJOR MISCONCEPTION ο¨ MIS β PRE-REQUISITES ο¨ MIS β CONSTRAINTS ο¨ MIS β MAJOR LIMITATIONS ο¨ DSS β CHARACTERISTICS ο¨ EIS β CHARACTERISTICS ο¨ DSS VS. TRADITIONAL MIS ο¨ EIS VS. TRADITIONAL INFORMATION SYSTEMS ο¨ BUSINESS APPLICATION OF EXPERT SYSTEMS ο¨ KNOWLEDGE MANAGEMENT SYSTEM ο¨ COMPONENT OF ERP ο¨ BENEFIT OF ERP ο¨ ELEMENT OF CORE BANKING SYSTEM Chapter β III β Protection of Information Systems (20 β 30 Marks) ο¨ INFORMATION SECURITY OBJECTIVE ο¨ IMPACT OF TECHNOLOGY ON INTERNAL CONTROL ο¨ INFORMATION SECURITY POLICY AND THEIR HIERARCHY ο¨ COMPONENTS OF GOOD SECURITY POLICY ο¨ 5 INTERRELATED COMPONENTS OF INTERNAL CONTROLS ο¨ CRITICAL CONTROL LACKING IN A COMPUTERIZED ENVIRONMENT ο¨ FINANCIAL CONTROL β TECHNIQUES ο¨ DATE BASE CONTROL β UPDATE AND REPORT CONTROL ο¨ 8 CATEGORIES/DESCRIPTION OF MANAGEMENT CONTROL ο¨ 5 TYPES OF CLASSIFICATION OF INFORMATION ο¨ 6 CATEGORIES OF DATA INTEGRITY CONTROL ο¨ DATA INTEGRITY POLICY ο¨ ASYNCHRONOUS ATTACKS β VARIOUS TYPES ο¨ ACCESS CONTROL MECHANISM β 3 STEPS ο¨ PHYSICAL ACCESS CONTROL β TECHNIQUES ο¨ CYBER FRAUD β TECHNIQUES AND DIMENSION3 Chapter β IV β Business Continuity Planning (10 β 16 Marks) ο¨ DEFINITION OF BUSINESS CONTINUITY PLANNING ο¨ OBJECTIVE AND GOALS OF BCP ο¨ BCP METHODOLOGY AND PHASES ο¨ COMPONENTS OF BCP PROCESS ο¨ BCM DOCUMENTATION AND RECORDS ο¨ RISK ASSESSMENT ο¨ MAINTENANCE TASKS UNDERTAKEN IN DEVELOPMENT OF BCP ο¨ REVIEWING BCM ARRANGEMENTS ο¨ TYPES /KINDS OF PLAN ο¨ TYPES OF BACK UPS ο¨ THIRD PARTY RECOVERY β ISSUES CONSIDERED BY SECURITY ADMINISTRATOR ο¨ DRP DOCUMENTATION ο¨ SOUND METHODOLOGY OF BUSINESS RESUMPTION PLANNING Chapter β V β Development of system (8 β 14 Marks) ο¨ AGILE MODEL STRENGTH AND WEAKNESSES ο¨ SYSTEM DEVELOPMENT METHODOLOGY ο¨ IS AUDIT ADVANTAGES β SDLC ο¨ SYSTEM REQUIREMENT ANALYSIS β OBJECTIVES ο¨ SYSTEM REQUIREMENT SPECIFICATION β DOCUMENT ο¨ FEASIBILITY STUDY β DIMENSION ο¨ FACT FINDING TECHNIQUES ο¨ ANALYSIS OF PRESENT SYSTEM ο¨ METHOD OF VALIDATING VENDOR PROPOSAL ο¨ GOOD CODED PROGRAM β CHARACTERISTICS ο¨ SYSTEM TESTING β UNIT, INTEGRATION, SYSTEM, FINAL ο¨ IMPLEMENTATION STRATEGIES ο¨ IMPLEMENTATION ACTIVITIES ο¨ SYSTEM MAINTENANCE Chapter β VI β Audit of Information Systems (12 β 20 Marks) ο¨ FACTORS INFLUENCING AN ORGANIZATION TOWARDS CONTROL AND AUDIT OF COMPUTERS ο¨ CHANGES TO EVIDENCE COLLECTION AND EVALUATION ο¨ SET OF SKILLS EXPECTED WITH AN IS AUDITOR ο¨ FUNCTIONS OF IS AUDITOR ο¨ 5 TYPES/CATEGORIES OF IS AUDITS ο¨ 6 STAGES OF INFORMATION SYSTEM AUDIT ο¨ PRELIMINARY REVIEW β LEGAL CONSIDERATION AND AUDIT STANDARD ο¨ 4 STEPS TO BE FOLLOWED FOR RISK BASED APPROACH ο¨ OVERVIEW OF APPLICATION CONTROL AND AUDIT TRAIL ο¨ INPUT & COMMUNICATION CONTROL β ACCOUNTING & OPERATIONS AUDIT TRAIL ο¨ SNAPSHOT ο¨ SCARF β TECHNIQUES ο¨ ADV AND DISADV OF CONTINUOUS AUDIT TECHNIQUES ο¨ CONTINUOUS AND INTERMITTENT SIMULATION ο¨ AUDIT TRAIL OBJECTIVE ο¨ AUDIT OF ENVIRONMENTAL CONTROL4 Chapter β VII β Information Technology Regulatory Issues (8 β 14 Marks) ο¨ THE OBJECTIVE OF IT ACT ο¨ SECTION 3 TO 15 AND SECTION 43, 44, 85 OF IT ACT ο¨ SEBI β SYSTEM AUDIT ο¨ RBI β SYSTEM CONTROL & SYSTEM AUDIT ο¨ FOUR PHASES OF ISMS AND PLAN PHASE, DO PHASE STEPS ο¨ ITIL FRAMEWORK ο¨ Four key benefits ISO 27001 Chapter β VIII β Emerging Technologies (8 β 14 Marks) ο¨ CLOUD VS. GRID SIMILARITIES AND DIFFERENCES ο¨ CLOUD COMPUTING β PERTINENT ISSUES ο¨ CLOUD COMPUTING β CHARACTERISTICS ο¨ CLOUD COMPUTING β ADVANTAGES ο¨ FIVE MOBILE COMPUTING BENEFITS ο¨ FOUR AREAS OF BYOD THREATS ο¨ WEB 2.0 MAJOR COMPONENTS ο¨ CATEGORIES IDENTIFIED FOR SOCIAL NETWORKING ο¨ GREEN IT β MAJOR STEPS