06 October 2018
Paper 6 – Information Systems Control and Audit Chapter – I – Concept of Governance (Average 14 – 20 Marks) MAJOR BENEFITS OF GOVERNANCE & IT GOVERNANCE KEY GOVERNANCE PRACTICES - RISK MANAGEMENT KEY MANAGEMENT PRACTICES - IT EXTERNAL COMPLIANCE AREAS OF REVIEW BY INTERNAL AUDITOR AS A PART OF REVIEW OF GRC INTERNAL CONTROL AS PER COSO KEY MATRIX USED FOR BENEFIT EVALUATION KEY BENEFITS OF GEIT KEY GOVERNANCE PRACTICES - OF GEIT ASSET, VULNERABILITY, THREAT, EXPOSURE, LIKELIHOOD, ATTACK, RISK DEFINITION VARIOUS RISK MANAGEMENT STRATEGIES COBIT 5 – BENEFITS COBIT 5 - SEVEN ENABLERS COBIT 5 – COMPONENTS Chapter – II – Information systems concepts (Average 12 – 18 Marks) IMPORTANT CHARACTERISTICS OF CBIS INFORMATION SYSTEM ATTRIBUTES TPS – KEY ACTIVITIES, COMPONENTS, BASIC FEATURES MIS – MAJOR CHARACTERISTICS MIS – MAJOR MISCONCEPTION MIS – PRE-REQUISITES MIS – CONSTRAINTS MIS – MAJOR LIMITATIONS DSS – CHARACTERISTICS EIS – CHARACTERISTICS DSS VS. TRADITIONAL MIS EIS VS. TRADITIONAL INFORMATION SYSTEMS BUSINESS APPLICATION OF EXPERT SYSTEMS KNOWLEDGE MANAGEMENT SYSTEM COMPONENT OF ERP BENEFIT OF ERP ELEMENT OF CORE BANKING SYSTEM Chapter – III – Protection of Information Systems (20 – 30 Marks) INFORMATION SECURITY OBJECTIVE IMPACT OF TECHNOLOGY ON INTERNAL CONTROL INFORMATION SECURITY POLICY AND THEIR HIERARCHY COMPONENTS OF GOOD SECURITY POLICY 5 INTERRELATED COMPONENTS OF INTERNAL CONTROLS CRITICAL CONTROL LACKING IN A COMPUTERIZED ENVIRONMENT FINANCIAL CONTROL – TECHNIQUES DATE BASE CONTROL – UPDATE AND REPORT CONTROL 8 CATEGORIES/DESCRIPTION OF MANAGEMENT CONTROL 5 TYPES OF CLASSIFICATION OF INFORMATION 6 CATEGORIES OF DATA INTEGRITY CONTROL DATA INTEGRITY POLICY ASYNCHRONOUS ATTACKS – VARIOUS TYPES ACCESS CONTROL MECHANISM – 3 STEPS PHYSICAL ACCESS CONTROL – TECHNIQUES CYBER FRAUD – TECHNIQUES AND DIMENSION3 Chapter – IV – Business Continuity Planning (10 – 16 Marks) DEFINITION OF BUSINESS CONTINUITY PLANNING OBJECTIVE AND GOALS OF BCP BCP METHODOLOGY AND PHASES COMPONENTS OF BCP PROCESS BCM DOCUMENTATION AND RECORDS RISK ASSESSMENT MAINTENANCE TASKS UNDERTAKEN IN DEVELOPMENT OF BCP REVIEWING BCM ARRANGEMENTS TYPES /KINDS OF PLAN TYPES OF BACK UPS THIRD PARTY RECOVERY – ISSUES CONSIDERED BY SECURITY ADMINISTRATOR DRP DOCUMENTATION SOUND METHODOLOGY OF BUSINESS RESUMPTION PLANNING Chapter – V – Development of system (8 – 14 Marks) AGILE MODEL STRENGTH AND WEAKNESSES SYSTEM DEVELOPMENT METHODOLOGY IS AUDIT ADVANTAGES – SDLC SYSTEM REQUIREMENT ANALYSIS – OBJECTIVES SYSTEM REQUIREMENT SPECIFICATION – DOCUMENT FEASIBILITY STUDY – DIMENSION FACT FINDING TECHNIQUES ANALYSIS OF PRESENT SYSTEM METHOD OF VALIDATING VENDOR PROPOSAL GOOD CODED PROGRAM – CHARACTERISTICS SYSTEM TESTING – UNIT, INTEGRATION, SYSTEM, FINAL IMPLEMENTATION STRATEGIES IMPLEMENTATION ACTIVITIES SYSTEM MAINTENANCE Chapter – VI – Audit of Information Systems (12 – 20 Marks) FACTORS INFLUENCING AN ORGANIZATION TOWARDS CONTROL AND AUDIT OF COMPUTERS CHANGES TO EVIDENCE COLLECTION AND EVALUATION SET OF SKILLS EXPECTED WITH AN IS AUDITOR FUNCTIONS OF IS AUDITOR 5 TYPES/CATEGORIES OF IS AUDITS 6 STAGES OF INFORMATION SYSTEM AUDIT PRELIMINARY REVIEW – LEGAL CONSIDERATION AND AUDIT STANDARD 4 STEPS TO BE FOLLOWED FOR RISK BASED APPROACH OVERVIEW OF APPLICATION CONTROL AND AUDIT TRAIL INPUT & COMMUNICATION CONTROL – ACCOUNTING & OPERATIONS AUDIT TRAIL SNAPSHOT SCARF – TECHNIQUES ADV AND DISADV OF CONTINUOUS AUDIT TECHNIQUES CONTINUOUS AND INTERMITTENT SIMULATION AUDIT TRAIL OBJECTIVE AUDIT OF ENVIRONMENTAL CONTROL4 Chapter – VII – Information Technology Regulatory Issues (8 – 14 Marks) THE OBJECTIVE OF IT ACT SECTION 3 TO 15 AND SECTION 43, 44, 85 OF IT ACT SEBI – SYSTEM AUDIT RBI – SYSTEM CONTROL & SYSTEM AUDIT FOUR PHASES OF ISMS AND PLAN PHASE, DO PHASE STEPS ITIL FRAMEWORK Four key benefits ISO 27001 Chapter – VIII – Emerging Technologies (8 – 14 Marks) CLOUD VS. GRID SIMILARITIES AND DIFFERENCES CLOUD COMPUTING – PERTINENT ISSUES CLOUD COMPUTING – CHARACTERISTICS CLOUD COMPUTING – ADVANTAGES FIVE MOBILE COMPUTING BENEFITS FOUR AREAS OF BYOD THREATS WEB 2.0 MAJOR COMPONENTS CATEGORIES IDENTIFIED FOR SOCIAL NETWORKING GREEN IT – MAJOR STEPS