1. |
Information Systems Concepts |
|
General Systems Concepts – Nature and types of systems, nature and types of information, attributes of information. |
|
Management Information System – Role of information within business |
|
Business information systems –various types of information systems – TPC, MIS, DSS, EIS, ES |
2. |
Systems Development Life Cycle Methodology |
|
Introduction to SDLC/Basics of SDLC |
|
Requirements analysis and systems design techniques |
|
Strategic considerations : Acquisition decisions and approaches |
|
Software evaluation and selection/development |
|
Alternate development methodologies- RAD, Prototype etc |
|
Hardware evaluation and selection |
|
Systems operations and organization of systems resources |
|
Systems documentation and operation manuals |
|
User procedures, training and end user computing |
|
System testing, assessment, conversion and start-up |
|
Hardware contracts and software licenses |
|
System implementation |
|
Post-implementation review |
|
System maintenance |
|
System safeguards |
|
Brief note on IS Organisation Structure |
3. |
Control objectives |
|
(a) |
Information Systems Controls |
|
Need for control |
|
Effect of computers on Internal Audit |
|
Responsibility for control – Management, IT, personnel, auditors |
|
Cost effectiveness of control procedure |
|
Control Objectives for Information and related Technology (COBIT) |
(b) |
Information Systems Control Techniques |
|
Control Design: Preventive and detective controls,
Computer-dependent control, Audit trails, User Controls (Control
balancing, Manual follow up) |
|
Non-computer-dependent (user) controls: Error identification
controls, Error investigation controls, Error correction controls,
Processing recovery controls |
(c) |
Controls over system selection, acquisition/development |
|
Standards and controls applicable to IS development projects |
|
Developed / acquired systems |
|
Vendor evaluation |
|
Structured analysis and design |
|
Role of IS Auditor in System acquisition/selection |
(d) |
Controls over system implementation |
|
Acceptance testing methodologies |
|
System conversion methodologies |
|
Post implement review |
|
Monitoring, use and measurement |
(e) |
Control over System and program changes |
|
Change management controls |
|
Authorization controls |
|
Documentation controls |
|
Testing and quality controls |
|
Custody, copyright and warranties |
|
Role of IS Auditor in Change Management |
(f) |
Control over Data integrity, privacy and security |
|
Classification of information |
|
Logical access controls |
|
Physical access controls |
|
Environmental controls |
|
Security concepts and techniques – Cryptosystems, Data Encryption Standards (DES), Public Key Cryptography & Firewalls |
|
Data security and public networks |
|
Monitoring and surveillance techniques |
|
Data Privacy |
|
Unauthorised intrusion, hacking, virus control |
|
Role of IS Auditor in Access Control |
|
4. |
Audit Tests of General and Automated Controls |
|
(a) |
Introduction to basics of testing (reasons for testing); |
(b) |
Various levels/types of testing such as: (i) Performance testing,
(ii) Parallel testing, (iii) Concurrent Audit modules/Embedded audit
modules, etc. |
|
5. |
Risk assessment methodologies and applications: |
|
(a) Meaning of Vulnerabilities, Threats, Risks,
Controls, (b) Fraud, error, vandalism, excessive costs, competitive
disadvantage, business, interruption, social costs, statutory sanctions,
etc. (c) RiskAssessment and Risk Management, (d)
Preventive/detective/corrective strategies |
6. |
Transfer pricing |
|
(a) Fundamentals of BCP/DRP, (b) Threat and risk
management, (c) Software and data backup techniques, (d) Alternative
processing facility arrangements,(e) Disaster recovery procedural plan,
(f) Integration with departmental plans, testing and documentation, (g)
Insurance |
7. |
An over view of Enterprise Resource Planning (ERP) |
8. |
Information Systems Auditing Standards, guidelines, best practices (BS7799, HIPPA, CMM etc.) |
9. |
Drafting of IS Security Policy, Audit Policy, IS Audit Reporting – a practical perspective |
10. |
Information Technology Act, 2000 |
No comments:
Post a Comment