M3: Management Information System Chapter:1: Emerging Technology, E-Business
M3: Management Information System Chapter:1: Emerging Technology, E-Business
E-Commerce Perspective:
E-commerce is defined through these perspectives;
1. Communication perspective:
Delivery of info, payments, products or services over the
telephone lines, computer networks or any other electronic means.E.g. cable net, easy paisa or
TV cable.
2. Community perspective:
Same types of businesses merge through e-commerce which helps
them to make their community.
3. Business purpose perspective:
Application technology towards the automation of business
transactions & work flow.
E.g. ATM, use of barcodes, Uber, careem
4. Service Perspective:
Addresses the desire of firms, consumers, and management to cut
service costs while improving the quality of goods and increasing speed of delivery.
E.g. Online banking & teaching.
5. Online perspective:
Capability of buying and selling products and info on the internet and
other online networks.
6. Collaborative service:
Collaboration of business and consumers through social networking
sites like Facebook, Youtube,
and LinkedIn.
E-Business:
2
A broader definition of E-commerce that includes not just the buying and selling of
goods and services but also serving the customers, collaborating with business partners and
conducting electronic transactions within an organization.
For example :
-Serving the Consumers:
CRM software is used to facilitate customers, used in banks, ATMs.
-Collaborating with business partners:
SCM automates the whole management process of supplying and distributing to wholesaler and
customer with the help of ERP and EDI.
-Conducting E-transactions:
EFT makes the process of transactions very easy and fast.
Pure VS Partial E-commerce:
EC takes several forms depending on the degree of digitization;
a) The product (or service) sold
B) The process
c) The delivery agent (or intermediary)
-Partial E-commerce:
Includes partially physical and partially online work process of E-commerce, like food delivery
app(food
Panda) or Online taxi service(Uber) where the process is online while the product or service is
physical.
-Pure E-Commerce:
In this whole process is electronic and digital where the product is also in digital form.
E.g. E-books, E-tickets etc.
Benefits to Organizations:
● Global Reach: business reaches all over by just using the internet and websites.
● Cost Reduction: cost reduced of physical outlets by opening digital outlets.
● Supply chain Improvement: supply chain method automated by software, order and
delivery time improved, which enhances the whole supply chain method.
● Extended Business Hours: 24/7 online business reached to maximum peoples
● Customization: independence to customers to order customizable by their own choices.
● New Business Models: SCM, ERP, CPM etc.
Benefits to Customers:
● Ubiquity: around the clock availability of business info and updates
● More products & Services: more choices
● Customized Products & Services: independence of customizing the order or service
● Cheaper Product & Services: more choices at cheap cost
● Instant Delivery: fast delivery options.
Benefits to Society:
● Telecommuting
3
E-commerce Risks:
Confidentiality:Potential customers are concerned about providing personal and sensitive
information to unknown vendors, as in every transaction between buyer and seller; the threat of
information being used wrongly is present like the theft of a credit card number.
IntegrityData both in-transit or in storage, could be at risk to unauthorized alteration or deletion
i.e.hacking
Availability: E-commerce nowadays, requires a business to be available on 24-hour, seven
days a week basis, so high availability is important otherwise any system failure or availability
issue could lead to loss of potential customers or business partners.
Authentication & Non-repudiation:Parties to an electronic transaction should be in a known
and trusted business relationship,requiring that they prove their respective identities through an
authentic medium. Then after that there must be some manner of ensuring that the parties
cannot deny the entering, completion and terms of the transaction.
Power shift to Customers:The internet gives consumers unparalleled access to vast market
information and makes it easier for them to shift between suppliers. Firms need to make their
offerings attractive and seamless in terms of service delivery.
B2B(Business-to-Business):
B-to-B e-commerce is the wholesale and supply side of the commercial
process, where businesses buy, sell or trade with other businesses. B-to-B relies on many
different technologies, most of which are implemented at e-commerce websites on the World
Wide Web
and corporate intranets and extranets.
B2B application includes;
● Electronic catalog systems such as exchange and auction portals.
● Electronic Data Interchange(EDI)
● Electronic funds transfer
E.g. Oracle, Alibaba, Qualcomm.
B2C(Business-to-Consumer):
The basic concept of this e-commerce model is to sell products only
to consumers. B2C is indirect trade between company and consumer, but it provides a direct
selling process through online. Businesses must develop attractive e-marketplaces to entice
and sell products or services to customers. They can offer:
● E-commerce websites that provide virtual storefront and multimedia catalogs.
● Interactive order processing
● Secure electronic payment systems
● Online customer support.
E.g. ebay, Amazon, Walmart.
4
B2E(Business-to-Employees):
In this e-commerce model an org delivers services, products or info to
its employees by making portals to facilitate them. It may include automation of the attendance
system, work from home, updated info of employees and org on a portal which can be easily
accessible by them.
B2G(Business-to-Govt.):
The sale and marketing of goods and services to federal, state or local
agencies. Contracts will be signed between govt. and companies in response to a govt.
agency's request for proposal (RFP), on their respective websites. Businesses bid for contracts
by submitting RFP responses. The whole bidding The process took place online in real-time.
E.g. Govt. procurements of weapons, roads, buildings etc.
G2C(Govt.-to-consumer):
It is defined as govt. providing goods, services and info to consumers
online and making it easier for them to interact with the government. Consumers can easily
access their personal info, record or conduct transactions such as change in address or family
status or solution of disputes on govt. online advisory portals or websites.
E.g. Information technology commission, Pakistan Telecommunication Authority, Pakistan
Citizen Portal.
C2C(Consumer-to-Consumer):
In this e-commerce model consumers directly sell to other
consumers. It allows consumers to buy and sell with each other in an auction process at an
auction website like ebay. It involves electronically facilitated transactions between individuals,
often through a third party. A common example is of an online auction site, such as ebay where
individuals can list an item for sale and others can bid to purchase it. These auction sites
normally charge commission to the sellers using them.E.g. Upwork, Pakwheels, OLX.
Application/Semantic Layer:
The application layer is also called the semantic layer. The
Semantic layer describes the Business application that is driving EDI. e.g. for a procurement
5
application, this translates into requests for quotes, purchase orders, acknowledgements, and
invoices. This layer is specific to a company, and the software it uses.
Standard Layer:
Now an organization may raise an invoice in its own software and send it to
customers who may be using totally different software. To achieve the successful
communication resulting in understanding of data formats, the company needs to follow some
EDI standards. e.g. X.12 from ANSI, EDIFACT from UN
Transport Layer:
This Layer defines the type of communication service or protocol to be used.
E.g. E-mail, Point to Point, WWW
Physical Layer:
The physical layer of EDI is also called the infrastructure layer. This layer defines
the data transmission path(s) for EDI.transactions. Dial-up lines, Internet, WANs.
6)Presentation layer:
It transforms the data into the foam in which the application layer accepts.
7)Presentation Layer:
6
It interacts with the end user. And convert msg to format which is able to
transport.
Improve business relationships. It provides the frame of web-enabled software and databases
that integrate these processes with the rest of organization's process.
CRM Applications:
1)Contract and Account Management:
It helps in automation of sales, marketing and service
professionals.
2)Sales:
Provides the software tool and data they need to support and manage sales activities.
-CROSS-Selling; trying to sell a customer of one product with a related product.
-UP-Selling; trying to sell customers a better product than they are currently seeking.
3)Marketing and Fulfillment:
Capturing the targeted market segments(like safeguard targets
children).
4)Retention and Loyalty programs:
Help organizations to identify, reward and market their most loyal and
profitable customers.
Data mining tools and analytical software, customer data warehouse.
CRM Support Customer Life Cycle:
CRM Benefits:
● Identify and target best customers
● Real-time customization and personalization of products and services
● Track when customer contacts org
● Provide consistent customer experience, superior service and support.
● Rely on application to first solve problem without changing the business process
● Business stakeholders not participating and not prepared.
Types of CRM:
There are 3 types of CRM:
1. Operational CRM: Capture details, generates
2. Analytical CRM: Data analysis.
3. Collaborative CRM: Feedback maintenance
Supply chain management is management of the flow of goods, data, and finances related to
a product or service, from the procurement of raw materials to the delivery of the product at its
final destination.
Upstream SCM :
The upstream portion of the supply chain includes the organization supplies
and the process for managing relations with them.
Downstream SCM:
It includes the process for distribution and delivery of products to the final
customers.
E-commerce Architecture:
E-commerce architecture refers to the overall structure and design
of an electronic commerce system. It involves various components and layers that work together
to facilitate online transactions.
Types of Architecture:
1)Single-Tier (Single-Layer) Architecture: In this type, all the components
of the e-commerce system are tightly integrated into a single unit.
Both the user interface and the data management functions reside on the same server.
2)Two-Tier Architecture: In a two-tier architecture, the system is divided into two main
components or tiers: the client or front-end and the server or back-end.
Client Tier: This is the user interface where interactions take place. It includes the presentation
logic and user interface components.
Server Tier: This tier manages the application logic and the database. It handles both business
processes and data storage.
3)Three-Tier Architecture:Three-tier architecture further separates the components, creating
three distinct tiers: presentation, application, and data.
Presentation Tier: Similar to the client tier in two-tier architecture, it deals with the user interface
and user interactions.
Application Tier: This tier, also known as the middleware, handles the application logic and
business processes. It acts as an intermediary between the presentation tier and the data tier.
Data Tier: Responsible for managing data storage, retrieval, and database interactions. It
focuses solely on handling data-related tasks.
Cloud Computing:
It is the delivery of computational services like servers, storages, network
connectivity, software operating systems,bandwidth connectivity, databases to help an
10
organization to fulfill their business needs. These servers can be made available on demand
and can be accessed remotely also.
e:g Microsoft azure, Amazon aws(Amazon web service), Google drive, dropbox, IBM
Accounts: AI helps accountants by automating tasks like organizing financial data, reducing
errors, and generating reports efficiently. It's like having a virtual assistant.
Finance: For finance, AI contributes by managing risks, detecting fraud, and optimizing
investment portfolios.
Information technology:AI is used for enhancing cybersecurity through rapid threat detection
and response.AI analyzes large datasets to uncover patterns and trends, aiding in strategic
decision-making for IT professionals
IT Service Management:
12
Problem Management:
It is the process of identifying cases of an incident as well as identifying
the best method to eliminate that root cause. Once a problem is identified and the root cause
has been found out, the condition becomes the Known Error. A workaround can be developed
to address the error state and prevent the future occurrence of related incidents.
Problem escalation and resolution: The primary risk from unresolved problems would be the
interruption of business operations. An unresolved hardware or software problems could
potentially corrupt data. IS management should
develop operations documentation to ensure that procedures exist for escalation of unresolved
problems to a higher level of management.Problem escalation procedures generally include:
-Name, contact details of persons who can deal with specific problems
-Types of problems that require urgent solution
-Problems that can wait until normal working hour
Help Desk:
It is a centralized system that provides assistance and resolves technical issues for
users and customers.
The help desk personnel must ensure that:
13
-All hardware and software problems that arise are fully documented.
-Problems are escalated based on priorities established by management.
-To be the first, single and central point of contact for users in any emergency.
-Follow up on unresolved problems and close out resolved problems.
Functions:
1. Troubleshooting
2. Resolve issues
3. User support
4. Documentation
5. Communication Bridge
6. Training and education
Release Management:
Release management is the process through which software is made
available to the user. The release will typically consist of a number of fixes and enhancements
to the service. A release of the new or changed software may consist of:
1. Major release:Normally contains a significant change or addition to new functionality. A
major upgrade or release usually supersedes all previous minor updates.
E.g. Windows 10 to Windows 11, Android 11 to Android 12 and Android to Harmony OS etc.
2. Minor release:Normally contains small enhancements or fixes. A minor upgrade or
release usually supersedes all preceding emergency fixes.
E.g. Windows 8 to 8.1 or ongoing security patches etc.
3. Emergency release:Normally contain the corrections to a small number of known
problems. Emergency releases are fixes that require implementation as quickly as
possible to prevent significant user downtime to business-critical functions.
E.g. high-priority security and critical bug fixes etc
-SLAs
Capacity Planning & Monitoring Elements:
1. Development
2. Monitoring
3. Analysis
4. Tuning
5. Implementation
6. Modeling
7. Application sizing
Media Sanitization:
It is a process by which data is irreversibly removed from media or the
media is permanently destroyed to preserve the confidentiality of sensitive information stored.
Sanitization: Permanently deleting or destroying data from a storage device to ensure it cannot
be recovered.
E.g.: Media sanitization can be accomplished by data overwriting, disintegration, magnetic
degaussing,shredding and melting etc.
Network:
The connection of two or more computers or devices via certain media(cable, air,
space etc), to share the information or to share the resources.
E.g. TV cable network, Computer cable network, Wi-Fi, Bluetooth, Mobile network, Satellite.
The communication lines for networks can be classified into dedicated circuit(leased lines) and
switched circuit.
1. Dedicated Circuit: Dedicated circuit also known as leased line is a symmetric
telecommunication line connecting two or more locations. Each side of the line is permanently
connected to the other.
Dedicated circuits can be used for telephone, data or internet services.
*Leased Line is a private dedicated point to point connection provided by service provider
between
two or more locations(solely for use of an org).
2. Switched Circuit: A switched circuit does not permanently connect two locations and can be
set up on demand, based on the addressing method.
Circuit switching: Switched circuits allow data connection that can be initiated when needed and
terminated when communication is complete. The circuit switching mechanism is typically used
over the telephone network like.
Packet switching: Packet switching is a technology in which users share common carrier
resources (same network resource).It is a mode of data transmission in which the data breaks
down into thousands of small chunks called packets, which are transmitted using a common
carrier resource network between users, choosing the best free path through different routes
and reassembled as a data file at the destination. It allows carrier to make more efficient use of
its infrastructure, the cost to the customer is much lower than leased lines.
E.g. Wi-Fi, cloud storage etc.
15
Types of Network:
There are three types of network:
Server-based network: In this setup, one or more servers provide services, resources, or data to
client devices connected to the network. Clients request access to these resources, and the
server responds accordingly. This architecture is common in enterprise environments where
centralized management and control are necessary.
Client-based network: This is similar to a server-based network, but with less reliance on
centralized servers. Instead, clients may communicate directly with each other or with
decentralized services. This model is often found in smaller-scale networks or in peer-to-peer
applications where each device acts as both a client and a server.
Peer-to-peer network (P2P): In a peer-to-peer network, all devices are considered equal peers
and can act both as clients and servers, sharing resources directly with each other without the
need for a centralized server. P2P networks are commonly used for file sharing, distributed
computing, and decentralized applications like cryptocurrency networks.
Classification of Networks:
The types of networks common to all organizations are:
Personal Area Networks (PANs): A micro computer network generally used for communications
among computer devices being used by an individual person. The extent of a PAN is typically
within a range of about 10 meters(33 ft). It may be wired with computer buses such as USB or
firewire and can be wireless (WPANs) made possible with IrDA or Bluetooth.
Local Area Networks (LANs): The network within a building or covers a limited area such as
home, office or campus. Characteristics of LAN are higher data transfer rate and smaller
geographic range. Ethernet and Wi-Fi (WLAN) are most common.
Media includes;
Cable: Coaxial (black TV cable)=185m & 500m
16
Intranet:
It is a privately owned network by an organization that is used to facilitate the
employees of the organization. It is not connected to the public nor accessible by the public. It
has all the services which are available over the internet. The services may include emailing,
downloading, uploading and virtual meeting etc.
Extranet:
It is a privately owned physical network by an organization that is used to facilitate the
stakeholders of the organization. The stakeholders can be supplier, producer, distributor, banks,
customers etc.
Database:
Database is the organized collection of data which is logically related and can be
accessed and controlled through computers. e:g NADRA, Bank, FBR systems have a large
amount of data which is logically related.
Some control functions of an effective database includes:
1. Create backup to recover
2. Avoid use of unauthorized system tool
3. Prevent unauthorized person access
4. Keep it accurate, complete and
5. Performance monitoring
Database Modeling:
Data modeling is a technique to create a specific data model or structure
for an information system. It specifies what data is used or produced and how data is organized
and connected to each other and how they are processed and stored inside the system.
4) Relationships: It is the association between two parties or link between two parties.
5) Degree of relationship: It shows how many entities are involved in a relationship. 1
entities = urinary relationship, 2 entities = Binary relationship, 3 entities = Trinary
relationship, 4 entities = Ternary relationship, 5 entities =Pentary relationship.
Redundancy:
A system design in which a component is duplicated so if it fails there will be a
backup.
Data warehouse:
It is designed to support business analysis and help in management decision
making. It extracts data from various sources specifically from the operational database then
filters and stores the data so it could be easy to interpret and do analysis.
Data mining:
The process of finding trends and patterns in large data to identify relationships
between them and help business analysis.
Benefits:
1. Improves personal efficiency
2. Speed up the process of decision making
3. Increases organizational control
4. Encourages exploration and discovery on the part of the decision maker
5. Speeds up problem solving in an organization.
Strategic planning decisions: where the decision maker develops objectives and allocates
resources to achieve these objectives.
Managerial control decisions: Deal with the use of resources in the organization and often
involve personnel or financial problems.
For example, an accountant may try to determine
the reason for a difference between actual and budgeted costs.
Operational control decisions: Deal with the day-to-day problems of the organization. These
21
SDLC:
Software development life cycle is a well-structured flow of phases that help an
organization to quickly produce high-quality software which is well-tested and ready for
production use.
Phases of SDLC:
1)System planning(feasibility):
In this pre development phase a feasibility study is
being conducted to assess how it would benefit the company and does it fulfill the needs of the
organization. It is categorized in:
a) Economical feasibility: Does a cost and benefit analysis to identify that this software
output is more than input or not. And also conclude that the company should buy, make
or outsource the software.
b) Technological feasibility: In this study they find that will this software run in the company,
can our employees use this easily and does the company own system be outdated or
can work for a longer time.
c) Organizational feasibility: This is also called organizational feasibility In this study they
assess how this software performs to solve business problems and user requirements.
d) Social feasibility: one of the feasibility studies where the acceptance of the people is
considered regarding the product to be launched. And also analyzed that this software
will run in our company environment.
22
Software creeping: It means that no more requirements will be fulfilled because if the customer
is continuously changing the requirements then in that case the software can never be made.
4)System development:
The detail design which was developed in the previous phase is being
used to begin coding. This phase is purely done by the developers and system analysts who are
building the system.
Programming language: Different programming languages are used for programming. Some of
its types are below:
1. Java: Known for its portability
2. Python: Valued for its readability
3. JavaScript: Crucial for web development
4. C++: Preferred for system-level programming
5. SQL: crucial for database interactions.
6. HTML/CSS:they are essential for front-end web development.
23
Program debugging: It is used to detect and fix or remove coding errors. It not only helps fixing
errors in a program but also gives an idea of how errors can affect a program overall.
5)Software testing:
It is an essential part of the development phase it do 2 thing :
1. Verification: Software meets all business requirements mentioned in the software
requirement specification document(SDS).
2. Validation: Ensure that software has no bugs.
Test plans:
Bottom up: Testing begins with atomic(small) units, and work upward until complete
system testing has been done.
Top down: Following the opposite path, tests begin with big units downward to the atomic units.
By testing major functions first.
UNIT testing: Testing of an individual program or module to check the functionality of an
individual unit.
Integration Testing: A hardware or software test that evaluates the data flow and communication
between different modules.
System Testing:Evaluating the entire system's functionality against the specified requirements.
Identifying defects that may arise from the integration of components.
Other tests:
Alpha and Beta Testing: Software goes through two stages of testing before it is considered
finished. The first stage, called alpha testing, is often performed only by users within the
organization developing the software (i.e., systems testing). The second and normally last
stage, called beta testing, a form of user acceptance testing, generally involves a limited
number of external users.
Validation Testing: Validation testing confirms that the software meets the specified
requirements and fulfills the intended purpose.
Regression Testing: Regression testing involves re-executing previously conducted tests to
ensure that new changes or modifications haven't adversely affected existing functionalities.
Parallel Testing: Parallel testing involves running two versions of a system simultaneously – one
is the existing or old system, and the other is the new or modified system and then compares
the results.
Sociability Testing: Purpose of this test is to confirm that the new or modified system can
operate in its target environment without adversely impacting existing systems.(corruption of
data etc).
After testing there are end user training and data conversion:
End user training: Develop training plans educate all the stakeholders including managers,
users and all related staff on how the new technology will impact the business operations.
stage. The decision made in one stage cannot be change after progressing towards the
next stage.
2. Spiral Model: The spiral model looks like a coil with many loops. The number of loops
varies based on each project. Its main purpose is to mitigate the risks and do risk
analysis before starting any new phase. The model has 4 quadrants: a) Top left:
Analyze and design. b) Top right: Construct first, second, third and fourth prototype.
c) Bottom right: Test and integrate. d) Bottom left : Plan next iteration
3. Prototyping: Prototyping is a development approach where a preliminary version of a
system is created to test ideas, gather feedback, and refine the final product. It has two
types : a) Throwaway prototype: Develop a quick, often simplified prototype with the
expectation that it will be discarded after obtaining insights.
b) Evolutionary prototype: Begin with a basic prototype and gradually enhance it based
on user feedback and changing requirements. In some cases the customers like the
prototype so much that they are ready to buy the prototype in case the prototype is being
sold.
4. Agile model: In Agile model the system does not plan the software at once but plan it in
phases and divide software life in phases which means that the planning, acquisition,
monitoring and reviewing is also done in phases. In the Agile model they make small and
smart teams avoid large teams and formulate teams according to need. It is very flexible
to change and user friendly. Agile approaches: a) extreme programing b) scrum and
scrum ban c) Canban.
Upper case tools: Those tools which are used in the planning, analysis and design stages of
SDLC. e:g software planning, prototype development, GUI design, process design
Lower case tools: Those tools which are used in testing, implementing and maintenance.
e:g change management, software testing, library control software.
Integrated case tools: These are those tools which can be used in all stages of SDLC.
Project Management :
A project can be defined simply as an activity, which has a start, middle
and end, and consumes resources. It will:
1. have a specific objective
2. have a defined start and end date (timescale)
3. consume resources
4. be unique
5. have cost constraints that must be clearly defined and understood to ensure the project
remains viable
6. require organization
6. Stakeholders – a list of the major stakeholders in the project and their interest in the
project.
7. Chain of command – a statement (and diagram) of the project organization structure.
2. Project Planning:
The project planning steps include the determination of:
1. Various tasks that need to be performed.
2. Sequence of activities.
3. Duration of each task.
4. Priority for each task.
5. Budget or costing for each of these tasks.
Function Point Analysis (FPA): The function point analysis (FPA) is the process of sizing
software based on the number of business functions an application must accomplish.
Gantt Charts: It is constructed to help in scheduling the activities and how many activities to be
performed. Identify which activities depend upon each other so it could be carried in sequential
form and which activities do not depend upon each so it could be performed in parallel.
Critical Path Methodology (CPM): It is used to create a project schedule and estimate the total
duration of a project by Determining critical path and slack time. This path is important because,
if everything goes according to schedule and there are no obstacles, its length provides the
shortest possible time to complete the overall project. Activities that are not in the critical path
have time slack.
Time box management: It is the time period in which the output must be produced. The deadline
is fixed and cannot be changed. You can raise resources but the deadline will not be
compromised.
29
3. Project execution:
Project execution means putting your plans into action and to achieve the
project objectives. It involves coordinating people and resources, managing tasks, and
addressing any challenges that may arise during the project's implementation.
4. Project control:
Project control involves monitoring, measuring, and regulating various aspects
of a project to ensure it stays on track in terms of scope, schedule, budget, and quality.
Different management controls:
1. Management of scope changes
2. Management of resource usage
3. Management of risk
5. Closing a project:
this stage it is ensured that the project has delivered its planned outputs, all
project activities are satisfactorily completed and after meeting stakeholders the outputs of the
project are successfully transferred/handed over to the project’s client/user.
Auditing:
It is a process in which a competent and vigilant person examines the financial
information, systems, or processes to ensure accuracy, compliance, and reliability. And form an
opinion about it.
Auditor's Characteristics:
• Independent (Not come under any influence)
• Impartial (Neutral/unbiased)
• Competent
• Vigilant (Sharp observation skills)
• Diplomatic (Evaluate a situation before speaking or acting)
• Assertive (Can convince others)
• Decisive
• Good documentation skills.
IS Audit:
It is a process in which a competent and vigilant person specifically focuses on
assessing the controls and security measures of an organization's information technology
infrastructure to safeguard data integrity, confidentiality, and availability.
Audit Charter:
An audit charter is a formal document that outlines the purpose, authority, and
responsibilities of an audit function within an organization.
Internal Audit:
The main objective of internal auditing is to confirm the efficiency and effectiveness of
operations and their contribution to the achievement of organizational goals. Internal auditor:
•Ensure adequate internal control
•Review the reliability of records
•Prevent and detect fraud.
External Audit:
31
Types of Audits:
The various types of audits that can be performed, internally or externally are:
1. Compliance audit: Compliance audit includes verifying that a company adheres to
relevant laws, regulations, and industry standards. e:g assessing tax compliance or data
protection regulations.
2. Financial audits: The purpose of a financial audit is to assess the accuracy of financial
statements and transactions to ensure accuracy and compliance with accounting
standards.
3. Operational audit: An operational audit is designed to evaluate the efficiency and
effectiveness of an organization's operational processes, such as supply chain
management or production workflows.
4. Integrated audit: An integrated audit combines financial and operational audit steps. It is
performed to assess the overall objectives within an organization, related to financial
information and assets’ safeguarding, efficiency and compliance
5. Administrative audit: An administrative audit is specifically relates to the audit of higher
management level i.e. Board of Directors and senior management.
6. Information System Audit: It is a process in which a competent and vigilant person
specifically focuses on assessing the controls and security measures of an
organization's information technology infrastructure to safeguard data integrity,
confidentiality, and availability.
7. Specified Audit: It is the examination of particular areas such as internal controls of
services performed by third parties.
8. Forensic Audit: Forensic Audits: An examination and evaluation of a firm’s financial and
operational information for discovering, disclosing and following up on fraud and crimes.
e.g. assessment of financial information to detect corporate fraud or analysis of
electronic devices to detect cybercrime activities.
Audit risks:
Audit risks can be defined as the potential errors or misstatements in financial or
information reports that auditors may fail to detect. *Non materialistic error-small issues (not
recorded in audit report)
*Material error-big issues (recorded in audit report)
The three main types of audit risks:
32
1. Inherent Risk: These are those risks which arise from the nature of the client's business,
industry, and environment. It is influenced by factors like complexity, transaction volume,
and management integrity.
2. Control Risk: It relates to the risk that internal controls in place fail to prevent or detect
material misstatements.It depends on the effectiveness of the client's internal controls.
3. Detection Risk: These are those risks which the auditor couldn't be able to detect
because of using Inadequate tests procedures.
4. 0verall Risks: It is the combination of all individual categories of audit risks i.e.
information or financial reports may contain material errors and that the auditor may not
detect an error that has occurred.
Risk Analysis:
Risk analysis is a part of audit planning that helps in identification of risks and Its
probability or likelihood of occurrence. It also helps in determining the frequency of occurrence
and its impact on the system.
Risk Management:
Risk management is a systematic process of identifying, assessing,
prioritizing, and mitigating risks to achieve organizational objectives.
Risk management process involves the following steps:
1. Risk Identification: Identify potential risks that could impact the achievement of
objectives.
2. Risk Assessment: Evaluate the likelihood and potential impact of each identified risk.
3. Risk Prioritization: Prioritize risks based on their significance, considering their potential
impact on objectives and the likelihood of occurrence.
4. Risk Mitigation or Control: Develop and implement strategies to reduce or eliminate the
impact of identified risks.
5. Monitoring and Review: Continuously monitor the risk to identify new risks or changes in
existing ones.
6. Communication and Reporting: Maintain clear communication channels to ensure that
relevant stakeholders are aware of the identified risks and the mitigation strategies in
place.
7. Documentation: Document the entire risk management process, including identified
risks, assessments, mitigation strategies, and outcomes.
Risk Treatment:
1. Risk mitigating: Implementing measures to reduce the likelihood or impact of the risk.
2. Risk Avoidance: Eliminating or avoiding the activities or conditions that could lead to the
identified risk.
33
3. Risk Acceptance: The risk and loss is accepted and no action is taken to prevent it. This
strategy is used when the cost of treatment is greater than the potential impact.
4. Risk Transfer: The risk and the loss is transferred to a third party usually through
insurance or contracts.
Internal Controls:
The policies, practices and organizational structures, implemented to reduce
the risk. They are designed to provide reasonable assurance to management that business
objectives will be achieved
and that undesired events will be prevented or detected and corrected.
Objectives of IS Control:
1. Safeguarding Assets
2. Ensuring Accuracy in Financial Reporting
3. Promoting Operational Efficiency
4. Ensuring Compliance
5. Preventing and Detecting Fraud
6. Enhancing Accountability
34
Control Classification:
1. Preventive Controls: Aimed at preventing errors or irregularities before they
occur.Examples include security measures, training programs, and access restrictions.
3. Corrective Controls: Implemented to rectify and mitigate the impact of identified errors or
issues.Examples include error correction procedures, process improvements, and
incident response plans.
COBIT 5:
Cobit 5(Control Objectives for Information and Related Technologies) is a framework
for the governance and management of enterprise IT. Developed by the Information Systems
Audit and Control Association (ISACA) and the IT Governance Institute (ITGI), COBIT 5
provides a comprehensive set of guidelines and practices to help organizations achieve their
strategic goals through effective and efficient IT governance.
General Controls:
General controls in Information Systems refer to the policies, procedures, and
technical measures that establish a secure and reliable computing environment.
1. Operational control that is concerned with the day-to-day operations, functions and
activities.
2. Administrative controls that are concerned with operational efficiency in a functional area
and adherence to management policies.
3. Procedures and practices to ensure adequate safeguards over access to the system.
4. Physical and logical security policies for all facilities, data centers and IT resources.
5. Internal accounting controls that are primarily directed at accounting operations.
Evidence:
data, or documentation that auditors gather and analyze to support their conclusions
and opinions about the effectiveness, efficiency, and security of an organization's information
systems.
Reliability of Evidence: Auditors assess the reliability of evidence based on factors such as its
source, accuracy, completeness, and relevance.
Sampling: Due to the vast amount of data in information systems, auditors often use sampling
techniques to gather evidence
Third-Party Reports: Reports from external parties, such as security assessments, penetration
testing, or compliance audits, can provide additional evidence
Confirmation: Obtaining confirmations from relevant parties, such as system administrators or
users, can validate information obtained during the audit.
Sampling:
It involves selecting a subset of data or transactions from a larger population to draw
conclusions about the entire population. It is impractical to examine every item in a population,
so auditors use sampling:
Statistical Sampling : It involves using mathematical techniques to
select a sample from a population and using the laws of probability to evaluate the results. e:g
Random sampling, stratified sampling
Non-Statistical (Judgmental) Sampling: Non-statistical sampling relies on the auditor's judgment
rather than mathematical techniques.
Attribute Sampling: Attribute sampling is used to estimate the proportion of a population with a
specific characteristic (attribute).
1. Attribute sampling or frequency estimating sampling : used to estimate the rate (percent)
of occurrence of a specific quality (attribute) in a population.
2. Stop-or-go sampling: Helps in preventing excessive sampling of an attribute at the
earliest possible moment.
3. Discovery sampling: Used when the expected occurrence rate is extremely low, to detect
fraud, violations of regulations or other irregularities.
36
Variable Sampling: Variable sampling is used to estimate the numerical value of a characteristic
in a population, such as the average or total dollar amount.
1. Stratified mean per unit: Statistical sampling that involves the division of a population into
smaller subgroups known as strata.
2. Un-stratified mean per unit: Statistical sampling in which a sample mean is calculated
and projected as an estimated total.
3. Difference estimation: Statistical sampling used to estimate the total difference between
audited values and book (unaudited) values.
Advantages of CAAT:
1. Population based Audit
2. Global Compliance picture
3. Increased productivity
4. Enhance quality of audit
5. Management reliable assurance.
Disadvantages of CAAT:
1. It is very costly
2. Technical skills are required to operate
3. Might face organizational inertia
4. Demoralization of company employees
5. Acceptability issues
4. Statistical functions
5. Arithmetical functions
Advantages:
1. Timely Risk Identification
2. Cost-Effective
3. Continuous Improvement
4. Cultural Integration
Disadvantages:
1. Time and Effort
2. Resistance Possible
3. Opinions Vary
4. Skill Differences
38
Business continuity planning (BCP): It involves creating a strategy to ensure that essential
business functions can continue during and after a disaster or disruption.
It typically includes risk assessment, developing recovery strategies, establishing emergency
response procedures, and maintaining communication channels.
BCP aims to minimize downtime and financial loss in the event of unexpected events such as
natural disasters, cyberattacks, or other disruptions. Regular testing and updates are essential
for an effective BCP.
Disasters:
Disasters are disruptions that affect critical information assets and the continuity of
business for a period of time, adversely impacting organizational operations. The disruption
could be a few minutes to several months, depending on the extent of damage to the
information resource. Most importantly, disasters require recovery efforts to restore operational
status.
Types/causes of disasters are:
1. Natural calamities: Such as earthquakes, floods, tornados, severe thunderstorms and
fire, which cause extensive damage to the processing facility and the locality in general.
2. Downfall of expected services: Disruption in supply of electrical power,
telecommunications, natural gas or other delivery services being supplied to the
company.
3. Man Made disaster: Such as terrorist attacks, hacker attacks, viruses or human error.
4. Other disruptions in services: Caused by system malfunctions, accidental file deletions,
untested application releases, loss of backup, network denial of service (DoS) attacks,
intrusions and viruses.
Pandemic Planning:
Pandemics can be defined as outbreaks of infectious diseases such as
Swine-Flu or COVID in humans that have the ability to spread rapidly over large areas, possibly
worldwide. Pandemic planning presents
Unlike natural disasters, technical disasters, malicious acts or terrorist events, the impact of a
pandemic is much more difficult to determine because of the anticipated difference in scale and
duration as compared to traditional business disasters. So, the IS auditor should evaluate an
organization’s preparedness for pandemic outbreaks.
S1: Get started: executives are required to provide necessary financial resources to start the
plan, keep the business up and running, and serve customers and clients.
S2: Identify business requirements:Document the core functions that must run to prevent
disruption by asking department leaders
what is the longest = amount of time they can run core functions without business systems (this
value is known as maximum tolerable down
S3: Determine recovery speed: Determine how long it would take to restore the system to
working order (this value known as recovery time objective - RTO).
S4: Deal with the gaps: Management should look the cases where MTD is less than RTO,
ensure
the numbers by talking to department leaders and asking to technologists for making changes to
procedures (if possible) that would allow them to recover a given system before reaching th
MTD.
S5: Maintain the program: Evolve business continuity plans as the needs of the business and
capabilities of technology change.
reputation. It's important to estimate these costs to plan how to minimize them during
emergencies.
2. Cost of the alternative corrective measures the implementation, maintenance and
activation of the BCP. This cost decreases with the target chosen for recovery time.
In addition to RTO and RPO, there are some additional parameters that are important in
defining the recovery strategies. These include:
Interruption window: Maximum time an organization can wait from point of failure till the
restoration of critical services.
Service delivery objective (SDO): Level/quality of services that must be maintained during the
alternate mode of operation and before going into the normal state.
Maximum tolerable outage: It is the maximum amount of time an organization can support to
execute in alternate mode.
Recovery Strategies:
42
Recovery Alternatives:
1. Mirror site: Mirror sites are used when RTO is in hours. These sites are fully equipped
and redundant with real time replication of data. I had a complete physical infrastructure.
2. Hot sites: Hot sites are used when RTO is between 5 and 7 hours. These sites have less
staff than mirror sites but are fully furnished with all the furniture needed. Data replication
is near to real time and the most recent backup copies of data may be available.
3. Warm sites: These are backup facilities that are partially equipped with IT infrastructure,
requiring additional setup before becoming fully operational. They offer a balance
between cost and recovery time objectives.
4. Cold sites: Cold sites are facilities that are essentially empty shells, lacking IT
infrastructure and very basic equipment. It is cost effective but requires a very high time
of recovery.
5. Mobile sites: Mobile sites are versions of websites optimized for viewing and interaction.
Mobile sites are mounted on transportable vehicles and kept ready to be delivered and
set up at a location upon activation.
6. Reciprocal Agreement: When two or more organizations agree to mutual sharing or
promotion of each other's content, typically through backlinks, social media mentions, or
other forms of collaboration. Reciprocal agreements can be beneficial for both parties by
increasing visibility and traffic.
Application Resiliency:
Application resilience is the ability of an application to react to
problems in its components and still provide the best possible service.
active node. In this case, cluster agents constantly watch the protected application and
quickly restart it on one of the remaining nodes. This type of cluster does not require any
special setup.
2) Active-Active clusters: In active-active clusters, the application runs on every node of the
cluster. With this setup, cluster agents coordinate the information processing between all
of the nodes, providing load balancing and coordinating data access. When an
application in such a cluster fails, users normally do not experience any downtime at all.
Redundant Array of Independent (or Inexpensive) Disks (RAID): (RAID) is the most common
method of protection against single point failure in the context of the data. It is a hardware +
software solution and is the best solution. It is fraud tolerant. These systems provide the
potential for cost effective mirroring offside for data backup.
RAID 1-Mirroring:
It consists of two drives in which data from the original drive is the array.
Mirroring is the key feature that ensures realIn case that a drive fails, data can easily be
restored from the mirrored one and just has to be copied onto a replacement drive.
RAID 5-Stripe set with Parity:
A minimum of three to maximum of seven drives are required for this configuration. It provides
data striping, a storage method to break down whole data in blocks and store information into
fragments across the disks in the array. Further utilizing distributed parity, if one drive fails it
continue processing and on the replacement recover the data strip of that drive with the help of
data stripes of other drives.
3. Diverse Routing: The method of routing traffic through split cable facilities or duplicate
cable facilities (ways). This can be accomplished with different and/or duplicate cable
sheaths (covering). (duplicate the facilities by having alternate routes)
4. Long-haul Network protection: Long haul network diversity provides redundancy for long
distance availability. Using ISDN or VPN along with routers (for WANs)
5. Last-mile Network protection:Last mile circuit protection provides redundancy for local
communication loops. Using Radio modems or Microwave dishes. (for MANs)
6. Voice recovery: Alternate for voice communications for organizations relying on it. Using
mobile network, POTS or VoIP (Voice over Internet Protocol).
Backup Schemes:
There are three main schemes for backup: full, incremental and differential.
Each one has its advantages and disadvantages. Usually, the methods are combined, in order
to complement each other.
1)Full backup : This type of backup scheme copies all files and folders to the backup media,
creating one backup set (with one or more media, depending on media capacity). The main
advantage is having a unique repository in case of restoration, but it requires more time and
media capacity.
2)Differential Backup: Differential Backup:
A cumulative backup of all files and folders that have been added or changed since a full
backup
was performed, i.e., the differences since the last full backup. It requires more storage and cost.
Its restoration requires only one backup and its restoration time is very less but more backup
time. Types of Backup devices and Media:
46
There are a lot of different devices and media types available. The technology chosen must be
adequate to the business needs.
3) Incremental Backup: Incremental Backup:
A backup of the latest copies of files and folders that have been changed or new since the last
incremental or full backup. It requires less storage and cost. It's restoration requires all backup
and also it's restoration time is high but less backup time.
Methods of Rotation:
The most accepted technique is referred to as the Grandfather backups (son) are made over
the course of a week. The final backup taken during the week becomes backup for that week
(father). At the end of the month, the final weekly backup is retained as the backup for that
month (grandfather).
Insurance:
47
The plan should contain key information about the organization’s insurance. The IT
processing
insurance policy is usually a multi-risk policy designed to provide various types of IT coverage.
Specific types of coverage available are:
• IT equipment and facilities: Provides coverage for physical damage to the IPFs(Information
process facilities) and owned equipment.
• Media (software) reconstruction: Covers damage to IT media for on-premises, off-premises or
in-transit situations and covers the actual reproduction cost of the property.
• Extra expense: Designed to cover the extra costs of continuing operations following damage or
destruction at the IPF.
• Business interruption: Covers the loss of profit due to the disruption of the activity of the
company caused by any malfunction of the IT organization.
• Valuable papers and records: Covers the actual cash value of papers and records against
direct physical loss or damage.
• Errors and omissions: Provide legal liability protection in the event that the professional
practitioner commits an act, error or omission that results in financial loss to a client.
• Fidelity coverage: Covers loss from dishonest or fraudulent acts by employees.
• Media transportation: Provides coverage for potential loss or damage to media in transit to
off-premises IPFs.
Test Execution:
. To perform testing, each of the following test phases should be completed:
• Pretest: the set of actions necessary to set the stage for the actual test. This includes placing,
transporting or installing proper equipment in the operations recovery area. These activities are
outside the realm of those that would take place in the case of a real emergency, just the
preparatory actions.
• Test: this is the real action of the business continuity test. Actual operational activities are
executed to test the specific objectives of the BCP. Evaluators review staff members as they
perform the designated tasks. This is the actual test of preparedness to respond to an
emergency.
• Posttest: the process of returning from backup recovery area to original. This phase includes
returning all resources to their proper place, disconnecting equipment and deleting all company
data from third-party systems.
addition, the following types of tests may be performed:
• Desk-based evaluation/paper test: a paper walk-through of the plan, involving major
personnel in the plan’s execution whom walk-through the entire plan or just a portion which help
in evaluating their knowledge about it.
• Preparedness test: usually a localized version of a full test, wherein actual resources are
expended in the simulation of a system crash. This test is performed on different aspects of the
plan to obtain evidence about how good the plan is.
• Full operational test: this is one step away from an actual service disruption. The organization
have tested the plan by creating a disaster themselves before real shut down of operations
48
Importance of ISM:
Recent developments in the current environment such and directly with
customers, use of remote access facilities, and high viruses, intrusions, etc.) have raised the
profile of information and privacy risk and the need for effective information security
management.Security objectives to meet organization’s business requirements include the
following:
• Continued Availability of information systems and data
• Integrity of stored and in-transit information.
• Confidentiality of stored and in-transit sensitive data
• Adherence to laws, regulations and standards
• Adherence to privacy policy and applicable rules
• Adequate Protection of sensitive data
• Commitment and support from senior management are important for successful establishment
and continuance of an information security management program.
• The policy framework should be established with a concise top management declaration of
direction.
• The information security policy should have clearly defined guidance on the allocation of
security roles and responsibilities in the organization, for the protection of critical resources.
• Users should receive appropriate training and regular updates to foster security awareness
and compliance with written security policies and procedures.
• Processes should be in place to identify,assess, respond to and mitigate risk to information
assets.
• Monitoring of compliance to applicable laws and regulations.
• Handling and response to incidents which includes loss of confidentiality of information,
compromise of integrity of information, denial of service, unauthorized access, misuse of
systems or information, theft and damage to systems.
Mandatory access controls (MACs) are logical access control filters used to validate access
credentials that cannot be controlled or modified by normal users or data owners; they act by
default.
Discretionary access controls (DACs) are logical access controls that may be configured or
modified by the users or data owners.
Logical access is defined as the interaction with hardware through remote access.
Technical exposures are types of exposure that exist due to accidental or intentional exploitation
of logical access control weaknesses. Intentional exploitation of technical exposures might lead
to computer crime.
1. Eavesdropping: Intercepting and listening to private communications, such as data
transmission over a network, without the knowledge or consent of the parties involved.
Eavesdropping can lead to unauthorized access to sensitive information.
2. Masquerading: Pretending to be someone else or impersonating a legitimate user or
system to gain unauthorized access to resources or to deceive users into disclosing
sensitive information.
3. Denial-of-Service (DoS) Attack: Flooding a network, system, or service with excessive
traffic or requests to overwhelm its resources, causing it to become unavailable to
legitimate users. This attack disrupts normal operations and can result in downtime or
service degradation.
4. Virus: A type of malicious software that infects a computer or system by attaching itself
to legitimate programs or files. Viruses can replicate and spread to other computers,
causing damage to files, software, and hardware.
5. Worm: A self-replicating type of malware that spreads across networks and systems
without requiring user interaction. Worms exploit vulnerabilities to propagate rapidly and
can cause widespread damage by consuming network bandwidth or disrupting services.
6. Spyware/Malware: Software designed to secretly monitor and collect information about a
user's activities, such as browsing habits, keystrokes, or personal data, without their
knowledge or consent. Spyware can be used for surveillance, identity theft, or
unauthorized access to sensitive information.
7. Email Spamming: Sending unsolicited and bulk emails, often containing advertisements,
scams, or malicious links, to a large number of recipients. Email spamming clogs mail
servers and inboxes, reduces productivity, and poses security risks.
8. Phishing: A type of cyber attack that involves tricking users into disclosing sensitive
information, such as login credentials or financial data, by impersonating legitimate
entities through fraudulent emails, websites, or messages.
9. Pharming: Redirecting users from legitimate websites to fraudulent or malicious websites
without their knowledge or consent. Pharming attacks exploit DNS vulnerabilities or
manipulate hosts files to hijack web traffic and steal sensitive information.
10. Trojan Horses: Malicious software disguised as legitimate programs or files to deceive
users into executing them. Once installed, Trojan horses can perform various malicious
actions, such as stealing data, compromising security, or providing backdoor access to
attackers
11. Trap Doors: Hidden or undocumented features or vulnerabilities intentionally inserted
into software or systems by developers, allowing privileged access to unauthorized
users.
12. Logic Bombs: Code or scripts embedded in software or systems to execute malicious
actions when specific conditions are met, such as triggering data deletion or system
disruption at a predetermined time or event.
52
Features of Passwords: A password provides individual authentication. It should be easy for the
user to remember, but difficult for an intruder to determine.
—Initial passwords should be allocated by the security administrator, when the user logs on for
the first time, the system should force a password change to improve confidentiality.
—If the wrong password is entered a predefined number of times (e.g. 3 times), the logon ID
should be automatically locked out.
—Users that have forgotten their password must notify a security administrator. This is the only
person with sufficient privileges to reset the password.
—Passwords should be hashed (a type of one-way encryption) and stored using a sufficiently
strong algorithm.
—Passwords should be changed on a regular basis (e.g., every 30 days).
—Special treatment should be applied to supervisor or administrator accounts. These accounts
frequently allow full access to the system.
Password syntax (format) rules: —Ideally, passwords should be a minimum of six to eight
characters in length, twelve characters length
is adequate.
—Passwords should require a combination of at least three of the following characteristics:
alphanumeric, upper and lower case letters and special characters.
—Passwords should not be particularly identifiable with the user (such as first name, last name,
spouse name, pet’s name, etc).
—The system should enforce regular password changes every 30 days and not permit previous
password(s) to be used for at least a year after being changed.
Token Devices, One-time Passwords: A two factor authentication technique in which, the user is
assigned a microprocessor-controlled smart card, USB key or mobile-device application with a
54
specific authentication system. It generates one-time passwords that are valid for only one login
session. Users enter this password along with a password they have memorized to gain access
to the system.
Biometrics: A user's identity based on unique, measurable attribute or trait for verifying the
identity of a human being.
Behavior-oriented biometrics:
Signature Recognition: Verifies identity based on unique signature characteristics like stroke
patterns and directions, stroke length and the points in time when the pen is lifted from the
paper. Used for authenticating signatures on documents and transactions.
Voice Recognition: Identifies individuals based on unique vocal characteristics like pitch and
tone.Used for voice authentication in devices and systems.
Single Sign-on: SSO is defined as the process for consolidating all organization platform-based
administration, authentication and authorization functions into a single centralized administrative
function.
LAN Security:
Risk associated with use of LANs includes:
- Loss of data and program integrity through unauthorized changes
- Lack of current data protection
- Virus and worm infection
- Illegal access by impersonating or masquerading as a legitimate LAN user
- Internal user’s sniffing
- Internal user’s spoofing (reconfiguring a network address to pretend to be a different address)
- Destruction of the logging and auditing data
Commonly available network security administrative capabilities include:
- Declaring ownership of programs, files and storage
- Limiting access under the principle of least privilege (read only)
- File locking to prevent simultaneous update
55
Virtualization:
Virtualization provides an enterprise with a significant opportunity to increase
efficiency and decrease costs in its IT operations. Virtualization creates a layer between the
hardware and the guest OSs to manage shared processing and memory resources on the host.
Often, a management console provides
administrative access to manage the virtualized system
• Authenticity—a third party must be able to verify that the content of a message has not been
changed in transit.
• Non-repudiation—the origin or the receipt of a specific message must be verifiable by a third
party.
• Accountability—the actions of an entity must be uniquely traceable to that entity.
• Network availability—the IT resource must be available on a timely basis to meet mission
Types of firewalls:
1)Packet Filtering Firewalls:
Packet filtering firewalls examine incoming and outgoing packets of
data based on predetermined rules. These rules typically include criteria such as source and
destination IP addresses, ports, and protocols.
Each packet is compared against the firewall's rule set, and if it matches an allowed rule, it is
permitted to pass through the firewall. If it matches a denied rule, it is blocked.
The advantages of this type of firewall are its simplicity and generally stable performance as the
filtering rules are performed at the network layer.
Its simplicity is also a disadvantage, because as direct exchange of packets is permitted so it is
vulnerable to attacks tunneled over permitted services or improperly configured.
3)State Inspection Firewalls: State inspection firewalls, also known as stateful firewalls, maintain
state information about active network connections to make more informed decisions about
allowing or blocking traffic.
Instead of just examining individual packets, state inspection firewalls keep track of the state of
each connection, such as whether it is new, established, or related to an existing connection.
Encryption:
Encryption is the process of converting a plaintext message into a secure
cipher text, which cannot be understood without converting it back via decryption (the reverse
process) to plaintext. This is done via a mathem
called the key.
60
Virus/Malware:
61
There are two major ways to prevent and detect viruses that infect computers and network
systems. The first is having sound policies and procedures in place (preventive controls) and
the second is by technical means (detective controls), including anti-virus software. Neither is
effective without the other.
Anti-virus software is the most common anti-virus tool and is considered as the most effective
means of protecting networks and host-based computer systems against viruses. It is both a
preventive and a detective control. Unless updated periodically, anti-virus software will not be an
effective tool against malware.
There are different types of anti-malware software.
1. Scanner: A scanner is a component of anti-malware software that scans files, programs,
and system memory for known malware signatures or suspicious patterns. It compares
files against a database of known malware signatures to detect and remove malicious
software.
2. Active Monitors: Active monitors, also known as real-time protection or on-access
scanners, continuously monitor system activity and incoming files for signs of malware.
They intercept and scan files in real-time as they are accessed or executed to detect and
block malware before it can infect the system.
3. Integrity CRC Checking: Integrity CRC (Cyclic Redundancy Check) checking is a
technique used to verify the integrity of files and detect tampering or corruption. A CRC
value is calculated for a file, and if the file is modified or corrupted, the CRC value
changes, indicating potential tampering or data corruption.
4. Behavior Blocking: Behavior blocking, also known as behavior-based detection, is a
proactive security technique that monitors the behavior of software and processes on the
computer to detect and block suspicious activities indicative of malware infections. It
analyzes program behavior, such as file modifications, registry changes, and network
activity, to identify and stop malware before it can cause harm.
5. Immunizers: Immunizers, also known as vaccine or protective features, are components
of anti-malware software that proactively protect against known malware threats by
immunizing the system against specific malware strains or vulnerabilities. They prevent
infection by creating a protective shield around the system or files, making them resistant
to known malware attacks.
Environmental Exposures:
Environmental exposures are due primarily to naturally occurring events. The result of such
conditions can lead to many types of problems. Generally, power failures can be grouped into
four distinct categories, based on the duration and relative severity of the failure:
• Total failure (blackout)—a complete loss of electrical power, which may span from a single
building to an entire geographical area, may be caused by bad weather conditions (storm,
earthquake) or due to inability of the electric supply company.
• Severely reduced voltage (brownout)—this is also the failure of an electrical utility company to
supply power within an acceptable range (i.e., 200-220 volts). Such failure can damage the
equipment or at least interrupt the critical business operations.
• Sags, spikes and surges—temporary and rapid decreases (sags) or increases (spikes and
surges) in voltage levels. It can cause loss of data, network transmission errors or physical
damage to hardware devices.
• Electromagnetic interference (EMI)—caused by electrical storms or noisy electrical equipment
(e.g., motors, fluorescent lighting, and radio transmitters), may cause computer systems to hang
or crash as well as damages similar to those caused by sags, spikes and surges.
63
Penetration Testing:
Combinations of procedures, whereby an IS auditor uses the same
techniques as a hacker, are called penetration tests, intrusion tests or ethical hacking. IS auditor
or cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
There are several types of penetration tests depending upon the scope, objective and nature of
the test.
Common types are:
• External testing—refers to attacks and attempts on the target’s network perimeter from outside
the target’s system (i.e., usually the Internet),
• Internal testing—refers to attacks and control circumvention attempts on the target from within
the perimeter (within the org from organization's network),
• Blind/Grey box testing—refers to the condition of testing when the penetration tester is
provided
with limited or no knowledge of the target’s information systems.
• Double blind/Black box testing—refers to an extension of blind testing, where the administrator
and security staffs at the target are also not aware of the test.
• Targeted/White box testing—refers to attacks and attempts on the target, while both the
target’s IT team and penetration testers, with information related to target and network design
are aware of the testing activities.
66
-Magnetic Storage Devices:A device that reads data from magnetic plates and writes to a disk in
the form of binary numbers with the help of headers upon each of them.
E.g. floppy, hard disk, tape drive etc.
-Optical Storage Devices: Optical disks read data from a sensor of a glass lens by burning the
tiny holes on the disk.Most common are CD, DVD, and Blue-Ray.
-Solid State Drive: SSDs store data permanently inside an integrated circuit, typically using flash
memory. The flash memory inside an SSD means data is written, transferred, and erased
electronically and silently
Boundary and Interfaces:
boundary" refers to the delineation between a system and its
environment. It defines what is included within the system and what lies outside of it. The
boundary helps in understanding and defining the scope of the system, including its inputs,
outputs, and interactions with the external environment.
interface" in system concepts refers to the point of interaction or communication between
different components or systems. Interfaces allow for the exchange of data, commands, or
signals between different parts of a system or between separate systems. Interfaces can be
physical, such as connectors or ports, or they can be logical, involving protocols or APIs
(Application Programming Interfaces).
Environment:
"environment" refers to the external context in which a system operates. The
environment encompasses all the factors, entities, and conditions that can influence or be
influenced by the system.
Internal environmental factors:They originate within the organization, like culture and resources,
religion, cross border
External environmental factors: external factors come from outside, such as rules and
regulations from the government.
Control:
The process of regulating or influencing system behavior to achieve desired outcomes.
Control mechanisms monitor system performance, compare it to desired standards or goals,
and make adjustments as necessary.
Types of Controls.
1) Feedback Control: The process of management using historical data to improve present
and future performance.
Steps in feedback control: 1) Monitoring
2) Comparansency
3) Analysis
4) Correction
2) Feed forward Control: It is a proactive approach in which the current situation is analyzed to
predict upcoming problems
Steps in feed forward control: 1) Anticipation
2) Planning
3) Implementation
68
4) Monitoring
Synergy:
When two or more departments/organizations collectively make a plan and implement
it for the benefits of both org/dept. It's benefit is more in collective working than in doing it
individually.
Coupling:
The degree of interdependence between different components or modules within a
system. It measures how closely connected or reliant one part of the system is on another.
There are several types of coupling:
Tight Coupling: In tight coupling, components are highly dependent on each other, meaning
changes to one component often require corresponding changes to others.
Loose Coupling: Loose coupling indicates a lower level of interdependence between
components. Changes to one component have minimal impact on others
Cohesion:
The degree to which the elements within a module or component are related to each
other. It measures how strongly the responsibilities of the elements within a module are related
to each other.
There are several types of cohesion:
1. Functional Cohesion: When components are integrated because they have to work on
one task.
2. Communicational Cohesion: When two or more components interact with each other to
share and store data.
3. Prosecutorial Cohesion: They are independent components and are a part of a larger
process.
4. Temporal Cohesion: When components of system are related and work at one time
5. Logical Cohesion: When all components are working on similar platforms/dates.
Fintech:
It is the combination of finance and technology that means using technology to provide
financial services.
Fintech Infrastructure: Fintech infrastructure is the technological backbone that facilitates the
delivery of financial services through digital channels.
This infrastructure is comprised of various components, including:
1) Payment Systems: These systems enable the transfer of funds between individuals,
businesses, and financial institutions. They include traditional payment networks like
credit/debit card networks, Automated Clearing House (ACH) systems
2) Banking APIs: Application Programming Interfaces (APIs) provided by banks and
financial institutions allow fintech startups to securely access banking data and services.
3) Blockchain Networks: Blockchain technology provides decentralized, transparent, and
secure transaction processing.
69
4) Data Analytics Platforms: Data analytics tools and platforms enable fintech startups to
analyze vast amounts of financial data to derive insights, identify patterns, and make
data-driven decisions.
5) Cybersecurity Measures: With the increasing digitization of financial services, robust
cybersecurity measures are essential to protect sensitive financial data and prevent
unauthorized access, fraud, and cyberattacks
Fintech startups: Fintech startups leverage this infrastructure to develop innovative solutions
that address various challenges and inefficiencies in the financial industry. These startups often
focus on disrupting traditional financial services by offering:
1) Digital Banking: Fintech startups develop mobile banking apps, digital-only banks, and
non banks that provide convenient, user-friendly, and cost-effective alternatives to
traditional brick-and-mortar banks.
2) Payments and Remittances: Startups create peer-to-peer payment apps, mobile wallets,
and cross-border remittance platforms that enable users to send and receive money
quickly, securely
3) Lending and Credit: Fintech startups offer online lending platforms, peer-to-peer lending
marketplaces, and alternative credit scoring algorithms that streamline the lending
process
4) Investment and Wealth Management: Startups develop robo-advisors, automated
investment platforms, and social trading networks that use algorithms and artificial
intelligence to provide personalized investment advice, portfolio management, and
trading services at lower fees than traditional financial advisors.
5) Insurtech: Fintech startups in the insurance technology (insurtech) space leverage
technology to digitize insurance processes, offer innovative insurance products, and
improve underwriting, claims processing, and risk management.
Automation and artificial intelligence (AI):Automation and artificial intelligence have proven to
be highly effective in various domains, including finance, healthcare, manufacturing, customer
service, and many others. Some key benefits of automation and AI include:
● Increased Efficiency
● Cost Savings
● Enhanced Accuracy
70
Big Data:
It refers to large volumes of structured, semi-structured, and unstructured data that are
generated at high velocity and vary in variety. These datasets are too complex and massive to
be processed and analyzed using traditional data processing techniques. Big Data typically
exhibit the following characteristics, known as the 3Vs:
Volume: Big Data involves vast amounts of data, often ranging from terabytes to exabytes in
size, generated from various sources such as sensors, social media, transactional systems, and
digital devices.
Velocity: Data is generated and collected at high speeds, requiring real-time or near-real-time
processing and analysis to derive timely insights and actions.
Variety: Big Data encompasses diverse types of data, including structured data (e.g., databases,
spreadsheets), semi-structured data (e.g., XML, JSON), and unstructured data (e.g., text,
images, videos).
Application of Big Data and data analytics in accountancy and audit can significantly improve
effectiveness in several ways:
1) Enhanced Risk Assessment: Big Data analytics enable auditors to analyze large
volumes of financial and non-financial data to identify patterns, anomalies, and potential
risks.
2) Improved Fraud Detection: Big Data analytics can help auditors identify suspicious
transactions, irregular patterns, and potential fraud indicators that may go unnoticed with
traditional audit methods.
3) Real-time Monitoring: Big Data technologies enable real-time monitoring of financial
transactions and business processes, allowing auditors to detect issues and anomalies
as they occur.
4) Predictive Analytics: Big Data analytics can be used for predictive modeling and
forecasting to anticipate future trends, risks, and opportunities.
5) Automation and Efficiency: Big Data technologies automate data collection, processing,
and analysis, reducing manual efforts and improving audit efficiency.
Blockchain:
Design: Blockchain is a decentralized, distributed ledger technology that records
transactions across a network of computers in a secure and immutable manner. Each
transaction is stored in a "block" that is linked to the previous block, forming a chain of blocks.
Uses: Blockchain technology is used in various applications, including cryptocurrency
transactions, supply chain management, voting systems, digital identity verification, smart
contracts, and decentralized finance (DeFi).
71
Limitations: Some limitations of blockchain include scalability issues, high energy consumption
(in proof-of-work consensus mechanisms), regulatory uncertainties, potential security
vulnerabilities in smart contracts.
Cryptocurrencies:
Design: Cryptocurrencies are digital or virtual currencies that use
cryptography for secure and decentralized transactions. They are typically based on blockchain
technology and operate independently of central banks or governments.
Uses: Cryptocurrencies are used for various purposes, including peer-to-peer transactions,
remittances, online purchases, investment and speculation, fundraising.
Limitations: Some limitations of cryptocurrencies include price volatility, lack of regulation and
consumer protection, potential for fraud and scams, scalability challenges.
Crowdfunding:
Design: Crowdfunding is a method of raising funds from a large number of
people (the "crowd") through online platforms. It typically involves soliciting small contributions
from a large number of individuals to finance a project, business, or cause.
Uses: Crowdfunding is used for various purposes, including startup financing, product
development, creative projects (e.g., films, music albums), charitable donations, and community
initiatives.
Limitations: Some limitations of crowdfunding include regulatory constraints (e.g., limitations on
who can invest, crowdfunding platform requirements), competition for attention and funding,
risks of project failure or fraud.