Isca

This query is : Resolved 

06 October 2018 Can anyone share import

06 October 2018
Paper 6 – Information Systems Control and Audit
Chapter – I – Concept of Governance (Average 14 – 20 Marks)
 MAJOR BENEFITS OF GOVERNANCE & IT GOVERNANCE
 KEY GOVERNANCE PRACTICES - RISK MANAGEMENT
 KEY MANAGEMENT PRACTICES - IT EXTERNAL COMPLIANCE
 AREAS OF REVIEW BY INTERNAL AUDITOR AS A PART OF REVIEW OF GRC
 INTERNAL CONTROL AS PER COSO
 KEY MATRIX USED FOR BENEFIT EVALUATION
 KEY BENEFITS OF GEIT
 KEY GOVERNANCE PRACTICES - OF GEIT
 ASSET, VULNERABILITY, THREAT, EXPOSURE, LIKELIHOOD, ATTACK, RISK DEFINITION
 VARIOUS RISK MANAGEMENT STRATEGIES
 COBIT 5 – BENEFITS
 COBIT 5 - SEVEN ENABLERS
 COBIT 5 – COMPONENTS
Chapter – II – Information systems concepts (Average 12 – 18 Marks)
 IMPORTANT CHARACTERISTICS OF CBIS
 INFORMATION SYSTEM ATTRIBUTES
 TPS – KEY ACTIVITIES, COMPONENTS, BASIC FEATURES
 MIS – MAJOR CHARACTERISTICS
 MIS – MAJOR MISCONCEPTION
 MIS – PRE-REQUISITES
 MIS – CONSTRAINTS
 MIS – MAJOR LIMITATIONS
 DSS – CHARACTERISTICS
 EIS – CHARACTERISTICS
 DSS VS. TRADITIONAL MIS
 EIS VS. TRADITIONAL INFORMATION SYSTEMS
 BUSINESS APPLICATION OF EXPERT SYSTEMS
 KNOWLEDGE MANAGEMENT SYSTEM
 COMPONENT OF ERP
 BENEFIT OF ERP
 ELEMENT OF CORE BANKING SYSTEM
Chapter – III – Protection of Information Systems (20 – 30 Marks)
 INFORMATION SECURITY OBJECTIVE
 IMPACT OF TECHNOLOGY ON INTERNAL CONTROL
 INFORMATION SECURITY POLICY AND THEIR HIERARCHY
 COMPONENTS OF GOOD SECURITY POLICY
 5 INTERRELATED COMPONENTS OF INTERNAL CONTROLS
 CRITICAL CONTROL LACKING IN A COMPUTERIZED ENVIRONMENT
 FINANCIAL CONTROL – TECHNIQUES
 DATE BASE CONTROL – UPDATE AND REPORT CONTROL
 8 CATEGORIES/DESCRIPTION OF MANAGEMENT CONTROL
 5 TYPES OF CLASSIFICATION OF INFORMATION
 6 CATEGORIES OF DATA INTEGRITY CONTROL
 DATA INTEGRITY POLICY
 ASYNCHRONOUS ATTACKS – VARIOUS TYPES
 ACCESS CONTROL MECHANISM – 3 STEPS
 PHYSICAL ACCESS CONTROL – TECHNIQUES
 CYBER FRAUD – TECHNIQUES AND DIMENSION3
Chapter – IV – Business Continuity Planning (10 – 16 Marks)
 DEFINITION OF BUSINESS CONTINUITY PLANNING
 OBJECTIVE AND GOALS OF BCP
 BCP METHODOLOGY AND PHASES
 COMPONENTS OF BCP PROCESS
 BCM DOCUMENTATION AND RECORDS
 RISK ASSESSMENT
 MAINTENANCE TASKS UNDERTAKEN IN DEVELOPMENT OF BCP
 REVIEWING BCM ARRANGEMENTS
 TYPES /KINDS OF PLAN
 TYPES OF BACK UPS
 THIRD PARTY RECOVERY – ISSUES CONSIDERED BY SECURITY ADMINISTRATOR
 DRP DOCUMENTATION
 SOUND METHODOLOGY OF BUSINESS RESUMPTION PLANNING
Chapter – V – Development of system (8 – 14 Marks)
 AGILE MODEL STRENGTH AND WEAKNESSES
 SYSTEM DEVELOPMENT METHODOLOGY
 IS AUDIT ADVANTAGES – SDLC
 SYSTEM REQUIREMENT ANALYSIS – OBJECTIVES
 SYSTEM REQUIREMENT SPECIFICATION – DOCUMENT
 FEASIBILITY STUDY – DIMENSION
 FACT FINDING TECHNIQUES
 ANALYSIS OF PRESENT SYSTEM
 METHOD OF VALIDATING VENDOR PROPOSAL
 GOOD CODED PROGRAM – CHARACTERISTICS
 SYSTEM TESTING – UNIT, INTEGRATION, SYSTEM, FINAL
 IMPLEMENTATION STRATEGIES
 IMPLEMENTATION ACTIVITIES
 SYSTEM MAINTENANCE
Chapter – VI – Audit of Information Systems (12 – 20 Marks)
 FACTORS INFLUENCING AN ORGANIZATION TOWARDS CONTROL AND AUDIT OF COMPUTERS
 CHANGES TO EVIDENCE COLLECTION AND EVALUATION
 SET OF SKILLS EXPECTED WITH AN IS AUDITOR
 FUNCTIONS OF IS AUDITOR
 5 TYPES/CATEGORIES OF IS AUDITS
 6 STAGES OF INFORMATION SYSTEM AUDIT
 PRELIMINARY REVIEW – LEGAL CONSIDERATION AND AUDIT STANDARD
 4 STEPS TO BE FOLLOWED FOR RISK BASED APPROACH
 OVERVIEW OF APPLICATION CONTROL AND AUDIT TRAIL
 INPUT & COMMUNICATION CONTROL – ACCOUNTING & OPERATIONS AUDIT TRAIL
 SNAPSHOT
 SCARF – TECHNIQUES
 ADV AND DISADV OF CONTINUOUS AUDIT TECHNIQUES
 CONTINUOUS AND INTERMITTENT SIMULATION
 AUDIT TRAIL OBJECTIVE
 AUDIT OF ENVIRONMENTAL CONTROL4
Chapter – VII – Information Technology Regulatory Issues (8 – 14 Marks)
 THE OBJECTIVE OF IT ACT
 SECTION 3 TO 15 AND SECTION 43, 44, 85 OF IT ACT
 SEBI – SYSTEM AUDIT
 RBI – SYSTEM CONTROL & SYSTEM AUDIT
 FOUR PHASES OF ISMS AND PLAN PHASE, DO PHASE STEPS
 ITIL FRAMEWORK
 Four key benefits ISO 27001
Chapter – VIII – Emerging Technologies (8 – 14 Marks)
 CLOUD VS. GRID SIMILARITIES AND DIFFERENCES
 CLOUD COMPUTING – PERTINENT ISSUES
 CLOUD COMPUTING – CHARACTERISTICS
 CLOUD COMPUTING – ADVANTAGES
 FIVE MOBILE COMPUTING BENEFITS
 FOUR AREAS OF BYOD THREATS
 WEB 2.0 MAJOR COMPONENTS
 CATEGORIES IDENTIFIED FOR SOCIAL NETWORKING
 GREEN IT – MAJOR STEPS


You need to be the querist or approved CAclub expert to take part in this query .
Click here to login now


CCI Pro
CAclubindia's WhatsApp Groups Link


Similar Resolved Queries


loading


Unanswered Queries



CCI Pro
Meet our CAclubindia PRO Members

Follow us
add to google news



Answer Query