bombay chartered a ountants’ so iety (bcas) · pdf filecc environment {amul} private...

51
BOMBAY CHARTERED ACCOUNTANTS’ SOCIETY (BCAS) CA FINAL ISCA AMENDMENTS FOR NOVEMBER 2016 EXAM BY CA KARTIK IYER

Upload: hoangkhanh

Post on 12-Mar-2018

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

BOMBAY CHARTERED ACCOUNTANTS’ SOCIETY

(BCAS)

CA FINAL ISCAAMENDMENTS FOR

NOVEMBER 2016 EXAM

BY CA KARTIK IYER

Page 2: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

CC Environment{AMUL} Private Cloud Public Cloud

Are also called Internal Cloud Provider Cloud

Managed by Organisations IT Department Vendor or 3rd party

Used by Organisation General public

Last point Presides over organisations boundaries ‘Pay per use mode’

Advantages Advantages

High level automation Highly scalable

Improves server utilisation…hence low cost servers

Development, deployment, management at affordable costs

Disadvantage Disadvantage

Development and management needs to be done by organisation

Security assurance

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 3: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Characteristics of Private cloudCertain characteristics of Private Cloud are as follows:

1. Secure: The private cloud is secure as it is deployed and managed by the organization itself, and hence there is least chance of data being leaked out of the cloud.

2. Central Control: As usual, the private cloud is managed by the organization itself, there is no need for the organization to rely on anybody and its controlled by the organization itself.

3. It is small in size and controlled and maintained by the organization.

4. Budget is a constraint in private clouds and they also have loose SLAs.

5. It provides a high level of security and privacy to the user.

6. Weak Service Level Agreements (SLAs): SLAs play a very important role in any cloud service deployment model as they are defined as agreements between the user and the service provider in private cloud. In private cloud, either Formal SLAs do not exist or are weak as it is between the organization and user of the same organization. Thus, high availability and good service may or may not be available.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 4: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Difference between on-premise Private Cloud andOutsourced Private Cloud

{MSN SLoPe} On-premise Private Cloud Outsourced Private CloudManagement Managed by the organization itself. Managed by the third party. Everything is same as usual private cloud

except that here the cloud is outsourced.

Service levelAgreements

(SLAs)

SLAs are defined between the organization and its users. Usershave broader access rights than general public cloud users andservice providers are able to efficiently provide the servicebecause of small user base and mostly efficient network.

These are usually followed strictly as it is a third party organization.

Network Network management and network issue resolving are easier. Thenetworks usually have high bandwith and low latency.

The cloud is fully deployed at the third party site and organizations connectto the third party by means of either a dedicated connection or throughInternet.

Security andData Privacy

Comparatively, it is more resistant to attacks than any other cloudand the security attacks are possible from an internal user only.

Cloud is relatively less secure and the security threat is from the third partyand the internal employee.

Location The data is usually stored in the same geographical locationwhere the cloud users are present. In case of several physicallocations, the cloud is distributed over several places and isaccessed using the Internet.

The cloud is located off site and when there is a change of location the dataneed to be transmitted through long distances.

Performance The performance depends on the network and resources and canbe controlled by the network management team.

The performance of the cloud depends on the third party that isoutstanding the cloud.

Page 5: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Characteristics of Public cloudCertain characteristics of Public Cloud are as follows:

1. Highly Scalable: The resources in the public cloud are large in number and the service providers make sure that all requests are granted. Hence public clouds are considered to be scalable.

2. Less Secure: Since it is offered by a third party and they have full control over the cloud, the public cloud is less secure out of all the other deployment models.

3. Stringent SLAs: As the service provider’s business reputation and customer strength are totally dependent on the cloud services, they follow the SLAs strictly and violations are avoided.

4. Highly Available: It is highly available because anybody from any part of the world can access the public cloud with proper permission, and this is not possible in other models as geographical or other access restrictions might be there.

5. Affordable: The cloud is offered to the public on a pay-as-you-go basis; hence the user has to pay only for what he or she is using (using on a per-hour basis). And this does not involve any cost related to the deployment.

6. There is No need for establishing infrastructure for setting up and maintaining the cloud.

7. There is No limit for the number of users.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 6: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Hybrid Cloud: The usual method of using the hybrid cloud is to have a private cloud initially, and then for additional resources, public cloud is used. The hybrid cloud can be regarded as a private cloud extended to the public cloud and aims at utilizing the power of the public cloud by retaining the properties of the private cloud.

Characteristics of Hybrid Cloud are as follows:Scalable: The hybrid cloud has the property of public cloud with a private cloud

environment and as the public cloud is scalable; the hybrid cloud with the help of its public counterpart is also scalable.

Partially Secure: The private cloud is considered as secured and public cloud has high risk of security breach. The hybrid cloud thus cannot be fully termed as secure but as partially secure.

Stringent SLAs: Overall the SLAs are more stringent than the private cloud and might be as per the public cloud service providers.

Complex Cloud Management: Cloud management is complex as it involves more than one type of deployment models and also the number of users is high.

The Advantages of Hybrid Cloud include the following:It is highly scalable and gives the power of both private and public clouds.It provides better security than the public cloud.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 7: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

•Community Cloud: The community cloud is the cloud infrastructure that is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (eg. mission security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premise. In this, a private cloud is shared between several organizations. This model is suitable for organizations that cannot afford a private cloud and cannot rely on the public cloud either.

• Characteristics of Community Clouds are as follows:• Collaborative and Distributive Maintenance: In this, no single company has full control over the whole

cloud. This is usually distributive and hence better cooperation provides better results.• Partially Secure: This refers to the property of the community cloud where few organizations share the

cloud, so there is a possibility that the data can be leaked from one organization to another, though it is safe from the external world.

• Cost Effective: As the complete cloud is being shared by several organizations or community, not only the responsibility gets shared; the community cloud becomes cost effective too.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 8: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Community Cloud (continued)

• Advantages of Community Clouds are as follows:• It allows collaborative work on the cloud.

• It allows sharing of responsibilities among the organizations.

• It has better security than the public cloud.

• It allows establishing a low-cost private cloud.

• The limitation of the community cloud is that the autonomy of the organization is lost and some of the security features are not as good as the private cloud. It is not suitable in the case where there is no collaboration.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 9: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

IAAS

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 10: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

The essential characteristics of the cloud include on-demand, self-service, broad network access,resource pooling, rapid elasticity, and measured service.

The National Institute of Standards and Technology (NIST) defines three basic service models –Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

What is Infrastructure as a Service (IAAS)? {diagram}

A typical IaaS provider may provide the following services :

Compute: Computing as a Service includes virtual Central Processing Inputs (CPUs) and virtual main mory for the Virtual Machines (VMs) that are provisioned to the end users.

Storage: STaaS provides back-end storage for the VM images. Some of the IaaS providers also provide the back end for storing files.

Network: Network as a Service (NaaS) provides virtual networking components such as virtual router, switch, and bridge for the VMs.

Load Balancers: Load balancing as a Service may provide load balancing capability at the infrastructure layer.

ComputeStorage

Network

Load Balancers

EDS Web

access

CM

Shared

Infrastructure

Metered

Services

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 11: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Characteristics of IaaS are as follows:

1. Centralized management: The resources distributed across different partsare controlled from any management console that ensures effective resource management and effective resource utilization.

2. Elasticity and Dynamic Scaling: Depending on the load, IaaS services canprovide the resources and elastic services where the usage of resources canbe increased or decreased according to the requirements.

3. Web access to the resources: The IaaS model enables the IT users to accessinfrastructure resources over the Internet. When accessing a huge computingpower, the IT user need not get physical access to the servers.

4. Shared infrastructure: IaaS follows a one-to-many delivery model and allowsmultiple IT users to share the same physical infrastructure and thus ensurehigh resource utilization.

5. Metered Services: IaaS allows the IT users to rent the computing resourcesinstead of buying it. The services consumed by the IT user will be measured,and the users will be charged by the IaaS providers based on the amountof usage.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 12: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Different instances of IAAS are as follows:1.Network as a Service (NaaS):

NaaS provides users with needed data communication capacity to accommodate burst in data traffic during data intensive activities such as video conferencing or large file download.

2.Storage as a Service (STaaS): Provides storage infrastructure on a subscription basis to users who want a low cost & convenient way to store data, synchronise data etc.

3.Database as a Service (DBaaS): Provides users with seamless mechanism to create, store and access databases at a hot site on demand.

4.Backend as a Service (BaaS): BaaS provides web and mobile application developers to connect their application to back end storage with added services such as user management, push notifications etc.

5.Desktop as a Service (DTaaS):Provides ability to end users to use desktop virtualization without buying & managing own infrastructure.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 13: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

PAAS

ISC

A b

y C

A K

AR

TIK

IY

ER

JB N

AG

AR

CA

STU

DY

CIR

CLE

CO

NTA

CT

98

33

86

76

42

Page 14: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

What is Platform as a Service?Characteristics of PaaS are as follows: {ABCD WO}

1. All in one:

Most of the PaaS providers offer services like programming languages to develop, test, deploy, host and maintain applications in the same Integrated Development Environment (IDE).

2. Built-in Scalability:

PaaS services provide built-in scalability to an application that is developed using any particular PaaS. This ensures that the application is capable of handling varying loads efficiently.

3. Collaborative Platform:

To enable collaboration among developers, most of the PaaS providers provide tools for project planning and communication.

4. Diverse Client Tools:

PaaS providers offer a wide variety of client tools like Web User Interface (UI), Application Programming Interface (API) etc. to help the developers to choose the tool of their choice.

5. Web access to the development platform:

PaaS provides web access to the development platform that helps the developers to create, modify, test, and deploy different applications on the same platform.

6. Offline Access:

To enable offline development, some of the PaaS providers allow the developer to synchronize their local IDE with the PaaS services. The developers can develop an application locally and deploy it online whenever they are connected to the Internet.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 15: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Software as a ServiceThe services provided by SaaS are as follows:

1. Business Services: SaaS providers provide a variety of business services to startup companies that includes ERP, CRM, billing, sales, and human resources.

2. Social Networks: Since the number of users of the social networking sites is increasing exponentially, loud computing is the perfect match for handling the variable load.

3. Document Management: Most of the SaaS providers provide services to create, manage, and track electronic documents as most of the enterprises extensively use electronic documents.

4. Mail Services: To handle the unpredictable number of users and load on e-mail services, most of the email providers offer their services as SaaS services.

BSWeb access

CM

One to Many

Multi-device

support

High availability

Software

Software API

Integration

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 16: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Characteristics of SaaS1. Centralized Management: Since SaaS services are hosted and managed from the

central location, the SaaS providers perform the automatic updates to ensure thateach customer is accessing the most recent version of the application without anyuser-side updates.

2. Better Scalability: Most of the SaaS services leverage PaaS and IaaS for itsdevelopment and deployment and ensure a better scalability than traditionalsoftware.

3. Web Access: SaaS services allow the end users to access the application from anylocation of the device is connected to the Internet.

4. One to Many: SaaS services are delivered as one-to-many models where a singleinstance of the application can be shared by multiple customers.

5. Multi-device Support: SaaS services can be accessed from any end user devices suchas desktops, laptops, tablets, smartphones, and thin clients.

6. High Availability: SaaS services ensure 99.99% availability of user data as properbackup and recovery mechanisms are implemented.

7. API Integration: SaaS services have the capability of integrating with other software orservice through standard APIs.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 17: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

The different instances of SaaS are as follows:

Testing as a Service (TaaS): This provides users with software testing capabilities such as generation of test data, generation of test cases, execution of test cases and test result evaluation on a pay-per-use basis.

API as a service (APIaaS): This allows users to explore functionally of Web services such as Google Maps, Payroll processing, and credit card processing services etc.

Email as a service (EaaS): This provides users with an integrated system of emailing, office automation, records management, migration, and compliance features.

Other Cloud Service Models1. Data as a Service (CaaS)

2. Security as a Service (SECaaS)

3. Identity as a Service (IDaaS)

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 18: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

What are the differences between Web 1.0, Web 2.0 and Web 3.0?

Web 1.0

“Read only web”

Static HTML webpage

Web 2.01.“Read-write web”

2.Dynamic web

3.Open Communication

4.Greater Collaboration

5.Application in :1. Marketing,

2. Education and

3. Social Media

6.Components of social media

Web 3.01. “Read-write-execute web”

2. Semantic web

3. User interaction is higher

4. Physical walls of computer were the boundaries in Web 1.0 and Web 2.0. However, Web 3.0 encourages more and more device to be connected to the web.

5. Eg. Content management can be used with artificial intelligence in Web 3.0

6. Researches in the field of Artificial intelligence are also included in the Web 3.0.

7. “Data Web Technology” is used in Web 3.0 which features data that are publishable and reusable through query-abled formats.

8. Major Components :Semantic Web – used to share and reuse data

across applications

Web services – Uses computer to computer interaction over the internet

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 19: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Green Computing Best Practices {Cycle plan story}

1. Develop a sustainable Green Computing plan

Includes stakeholders to include checklist, recycling policies, recommendations for disposal etc.

There should also be ongoing communication between enterprise to users and IT Community should be encouraged towards Green IT.

2. Recycle

Dispose E-waste as per regulations. Discard Electronic Equipments in a responsible way.

Manufacturers must provide solution after the end-of-life of equipment.

3. Make environmentally sound purchase decisions

Recognise manufacturers effort to reduce the Environmental impacts of products.

Purchase Equipments based on their Environmental attributes.

4. Reduce Paper Consumption

Use of email, Use of ‘track changes’ feature in Electronic document, use of online marketing than paper based marketing, printing documents on both sides, using smaller font size.

5. Conserve Energy : write Steps in Green IT (check module)

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 20: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

‘Bring Your Own Device’ (BYOD)

Advantages of BYOD1. Happy Employees :

Employees love to use their own devices at work. This also reduces the number of devices they have to carry.

1. Early adoption of new Technologies :

Employees are generally proactive in adoption of new technologies that result in enhanced productivity of employees leading to overall business growth.

1. Increased employee efficiency :

Efficiency of employees is more when they use their own device. If they use the device provided by organization, then they have to learn and there is a learning involved in it.

1. Lower IT budgets :

It leads to financial savings for the organization since employees use their own device.

1. IT reduces support requirement :

IT department does not have to provide end user support and maintenance for all those devices leading to cost savings.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 21: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

MOBILE COMPUTING• Components of Mobile Computing

1. Mobile Communication

Communication should be seamless and reliable. It would include properties, protocols, data formats and concrete technology.

2. Mobile Hardware

Includes components like portable laptops, smartphones, tablets etc. at the Back End, there are various servers like application servers, database servers etc.

3. Mobile Software

It’s the actual program that runs on the hardware. Apps are being which are essential components of a Mobile device.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 22: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Limitations of Mobile Computing{Shock laga – Fat Watchman aaya story}

1. Human interface with deviceScreens and keyboard tend to be small and hence hard to use.

Alternative Input method like speech/handwriting recognition require training

2. Power consumptionWhen power outlet is not available, mobile computers must rely on battery power.

There should be better ways to encourage Green IT in power saving.

3. Potential health hazardsUsing mobile devices while driving causes distraction.

Cell phones may also interfere with medical devices.

4. Security StandardsAttack can be easily done on the Virtual Private Network (VPN) through a huge number of networksinterconnects through a line.

5. Insufficient BandwidthMobile internet access is generally slower than direct cable connection.

6. Transmission interferencesWeather, Terrain and the range from the nearest signal point can all interfere with signal reception.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 23: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

ISSUES IN MOBILE COMPUTING1.Security Issues: Wireless networks have relatively more security requirements than

wired network. A number of approaches have been suggested and also the use ofencryption has been proposed.

1. Confidentiality: Preventing unauthorized users from gaining access to critical information ofany particular user.

2. Integrity: Ensures unauthorized modification, destruction or creation of information cannottake place.

3. Availability: Ensuring authorized users getting the access to services.4. Legitimate: Ensuring that only authorized users have access to services.5. Accountability: Ensuring that the users are held responsible for their security related activities

by arranging the user and his/her activities are linked if and when necessary.

2.Bandwidth:Bandwidth utilization can be improved by logging (bulk operations against short interest) andcompression of data before transmission.

3.Location Intelligence:As mobile computer move, the encounter network with different features.

They should be able to switch from infrared mode to radio mode as it moves from indoorsto outdoors.

ISC

A b

y C

A K

AR

TIK

IY

ER

JB N

AG

AR

CA

STU

DY

CIR

CLE

CO

NTA

CT

98

33

86

76

42

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 24: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

4. Power Consumption:

Mobile phones rely on battery as the primary source of power. Power management can be of help.

5. Revising the technical architechture:

To provide complete connectivity, current technology must be revised to incorporate mobile connectivity

6. Reliability, coverage, capacity and cost:

At present wireless network has less reliability, geographic coverage, bandwidth and are slower and cost more than wired line network.

7. Integration with legacy framework and client/server application

Huge inventory of Application which are incompatible with mobile connectivity have been accumulated.

8. End-to-end design and performance

Mobile computing involves multiple network, end to end technical compatibility, etc which are difficult to achieve.

9. Business challenges

Mobile computing also faces business challenges because of lack of trained professionals to bring technology to general people.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 25: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Critical control lacking in computerized environment are as under:

{Lack of MAC, Absence of Win CoIn}

1. Lack of • Management Understanding of IS Risks and Controls• Awareness and Knowledge of IS Risks and Controls• Control features and implementation of high technology

2. Absence of1. Weak general controls and IS controls2. Inadequate IS Control Framework

3. Complexity of implementation of Control in distributed computing environment

4. Inappropriate technology implementations or inadequate security functionality

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 26: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Top Management and Information Systems Management ControlsPlanning, Organising, Leading, Controlling

1. PlanningDetermining goals and means to achieve these goals

Recognizing opportunities & problems that confront the organisation in which the IT & IS can be applied cost effectively;

Identifying the resources needed to provide the required information technology & information systems;&

Formulating Strategies and tactics for acquiring the needed resources

2 types of Information Systems plans

Strategic plan – long run plan covering next 3 to 5 years

Operational plan – short run plan covering next 1 to 3 years

Reviewed regularly

and updated as

need arises

Auditor’s Role –

Auditors need to evaluate whether top management has formulated a high-quality

information system’s plan that is appropriate to the needs of an organization or not. A

poor-quality information system is ineffective and inefficient leading to losing of its

competitive position within the marketplace. ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 27: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

2. OrganizingGathering, allocating and coordinating the resources needed to accomplish goals

Resourcing the Information Systems Function: Acquire the resources needed (usually hardware, software, personnel,

finances and facilities) Provide adequate funding to support Auditors should question understanding of the top management

Staffing the Information Systems Function:It involves 3 activities : Acquisition of IS personnel Development of IS personnel Termination of IS personnel

Auditor’s Role –Auditors should be concerned about how well top management acquires and manages staff resources for three reasons:1. IS Function’s effectiveness is determined by the quality of its staff. The IS staff need to remain up to date

and motivated in their jobs.2. Intense competition and high turnover have made acquiring and retaining good information system staff a

complex activity.3. Research indicates that the employees of an organization are the most likely persons to perpetrate

irregularities.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 28: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

3. Leading1. Motivating, Guiding and Communicating with personnel

Motivating & Leading Information Systems Personnel: there is no one best way

motivating/leading people need to change depending upon particular characteristics of an individual person & his/her environment.

Communicating with IS Personnel: Effective communications are essential to promoting good relationships and a sense of trust among work colleagues.

For example due to failure in understanding the directions given by the top management, a serious error is made in the system design; the effect of which is for long-term.

Auditor’s Role –1. Generally, motivation problem suggests poor leadership.2. Usually motivation problem is indicated by staff turnover statistics, frequent failure of projects to meet

budget, absenteeism level etc.3. Auditor’s must use formal as well as informal sources to evaluate the how well the top management is

communicating with its staff1. Formal : IS Plans, Policies, Standards2. Informal : Interviews with IS Staff regarding satisfaction with top mgmt.

4. Auditor must assess short-run and long-run consequences of poor communication ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 29: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

4. Controlling

Comparing actual performance with planned performance and take corrective actions

1. Overall Control of IS function:

When top managers seek to exercise overall control of the information systems function, two questions arise:

How much the organisation should be spending on the IS function?

Is the organisation getting value for the money from its IS function?

2. Control of Information Systems activities:

Top managers should seek to control the activities on the basis of Policies & Procedures and Standards

Policies provide broad, general guidelines for behavior Standards provide specific guidelines for behavior.

New & existing staff must be made aware of the policies & procedures that govern their work.

3. Control Over Information System Services:

For each service level, estimates must be made of the expected benefits & resource consumption & finally the review committee must establish priorities.

Auditor’s Role –

Auditor should focus on whether control activities are mainly performed to accomplish

objectives at a global level

Auditors must evaluate whether top management’s to the means of control over the

users of IS services is likely to be effective or not.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 30: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Systems Development Management Controls(Responsible for designing, implementing and

maintaining information systems)

Auditors role –

1. Concurrent Audit

1. Auditors are members of the system development team

2. They assist in improving quality of systems development

2. Post implementation Audit

1. Auditors help an organization learn from its experience

2. Auditors may evaluate whether system needs to be scrapped, continued or modified in some way

3. General Audit

1. Auditors evaluate overall System Development controls

2. Auditors seek to reduce the extent of substantive testing ISC

A b

y C

A K

AR

TIK

IY

ER

IYER

PR

OFESSIO

NA

L A

CD

EM

YC

ON

TAC

T 9

83

38

67

64

2

Six activities deal with System development controls. These are :

1. System Authorisation Activities

2. User Specification Activity

3. Technical Design Activities

4. Internal Auditor’s Participation

5. Program Testing

6. User Test and Acceptance Procedures

Part of

earlier

portion

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 31: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Programming Management Controls1. Planning – Techniques like Work Breakdown Structures (WBS), Gantt charts and Program

Evaluation and Review technique (PERT) can be used

2. Control - The Control phase has two major purposes:

• Task progress in various software life cycle phases should be monitored against plan & correctiveaction should be taken in case of any deviations.

• Control over software development, acquisition & implantation tasks should be exercised toensure software released for production use is authentic, accurate & complete.

3. Design – Systematic approaches like Structure design approaches or object oriented design is adopted

4. Coding – Programmers must choose module implementation and Integration strategies (Top down, bottom up and Thread approach) ;Coding strategy (following structured programming) ;Documentation strategy (to ensure program is easily readable and understandable)

5. Testing – 3 types : Unit testing, Integration testing, Whole of program testing

6. Operation and Maintenance – Establish formal mechanisms to monitor the operational programs. There are 3 types :

Repair Maintenance, Adaptive Maintenance and Perfective Maintenance

Focuses on individual program modules group of program modules whole program

In which program errors are corrected program is modified to meet program is tuned to decrease

to meet user requirement the resource consumption ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 32: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

In relation to Programming Management Controls, Auditor should

Activity Description

Planning Evaluate whether the nature of and extent of planning are appropriate to the different types of software. Evaluate how well the planning work is being undertaken.

Control Evaluate whether the nature of and extent of control activities undertaken are appropriate for the different types ofsoftware

Gather evidence on whether the control procedures are operating reliably. For example – they might first choose a sample of past and current software development and acquisition projects carried

out at different locations in the organization they are auditing.

Design Find out whether programmers use some type of systematic approach to design. Obtain evidence of the design practices used by undertaking interviews, observations, and reviews of documentation.

Coding Seek evidence – On the level of care exercised by programming management in choosing a module implementation and integration

strategy. To determine whether programming management ensures that programmers follow structured programming

conventions.

Testing Auditors can use interviews, observations, and examination of documentation to evaluate how well unit testing isconducted.

Auditors are most likely concerned primarily with the quality of integration testing work carried out by information systemsprofessionals rather than end users.

Auditor’s primary concern is to see that whole-of-program tests have been undertaken for all material programs and thatthese tests have been well-designed and executed.

Operation and Maintenance

Auditors need to ensure effectively and timely reporting of maintenance needs occurs and maintenance is carried out in awell-controlled manner.

Ensure that management has implemented a review system and assigned responsibility for monitoring the status ofoperational programs. IS

CA

by C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 33: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Data Resource Management Controls

1. Centralized planning and Control are implemented.

2. Data is available in the Form it is needed, Data is available to the Users when it is needed, Data is available in the Location where it is needed

3. It must be possible to Modify data fairly easily and the Integrity of data is preserved

4. Careful Control is established over the roles by appointing senior, trustworthy persons and monitoring data administrator’s logs and activities

The control activities involved in maintaining the integrity of the database is as

under:

1. Definition Controls: These controls are placed to ensure that the

database always corresponds & comply with its definition standards.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 34: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

2. Existence/Backup Controls:These ensure the existence of the database by establishing backup & recoveryprocedures.

1. Dual recording of data : • Under this strategy, two complete copies of the database are maintained.

The databases are concurrently updated.

2. Periodic dumping of data : • This strategy involves taking a periodic dump of all or part of the database onto

some backup storage medium – magnetic tape, removable disk, Optical disk, etc. The dump may be scheduled

3. Logging input transactions : • This involves logging the input data transactions which cause changes to the

database. Normally, this works in conjunction with a periodic dump.

4. Logging changes to the data : • This involves copying a record each time it is changed by an update action.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 35: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

3. Access Controls: Access controls are designed to prevent unauthorized individual from viewing,

retrieving, computing or destroying entity’s data. Controls are established in the following manner:

User Access Controls through passwords, tokens & biometric controls

4. Update Controls: • These controls restrict update of the database to authorized users in two

Ways:• By permitting only addition of data to the database; &• Allowing users to change or delete existing data.

5. Concurrency Controls:• These controls provide solutions, agreed-upon schedules & strategies to

overcome the data integrity problems that may arise when two update processes access the same data item at the same time.

6. Quality Controls: • These controls ensure the accuracy, completeness, & consistency of data

maintained in the database.• This may include traditional measures such as program validation of input

data & batch controls over data in transit through the organisation.

Auditor’s RoleTo:1. Determine what controls are exercised to maintain data integrity2. Interview database users to determine their level of awareness

of these controls3. Employ test data to evaluate whether access controls and update controls are

working

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 36: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Quality Assurance Management Controls

1.Users are becoming more demanding

2.Organisations are undertaking more ambitious information systems projects

3.More stringent quality standards are required to avoid production and selling of defective products

What are the reasons for the emergence of Quality assurance in many organizations?{Factory owner diagram}

1. Organizations are increasingly producing safety-critical systems 2. Users are becoming more demanding in terms of their expectations about the quality of

software they employ to undertake their work.

3. Organizations are undertaking more ambitious projects when they build software.

4. Organizations are becoming more concerned about their liabilities if they produce & sell defective software.

5. Poor quality control over the production, implementation, operation, & maintenance of software can be costly in terms of missed deadlines, dissatisfied users & customer, lower morale among IS staff, higher maintenance & strategic projects that must be abandoned.

6. Improving the quality of Information Systems is a part of a worldwide trend among organizations to improve the quality of goods & services they sell. IS

CA

by C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 37: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Auditor’s Role in

Quality Assurance Management Controls

1. Auditors might use interviews, observations and reviews of documentation to evaluate how well QA personnel perform their monitoring role.

2. Auditors might evaluate how well QA personnel make recommendations for improved standards or processes through interviews, observations, and reviews of documentation.

3. Audits can evaluate how well QA personnel undertake the reporting function and training through interviews, observations, and reviews of documentation.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 38: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Security Management Controls

1. Fire

2. Water

3. Energy Variations

4. Structural Damage

5. Pollution

6. Hackers

7. Unauthorised Intrusion

8. Viruses and Worms

9. Misuse of Software, Data and

Services

Controls are required to protect against :

However, in spite of the controls on place, there could be a possibility that a control might fail. When

Disaster strikes, it still must be possible to recover operations & mitigate losses using the last resort

controls – A disaster Recovery Plan (DRP) & Insurance.

DRP:

1. A comprehensive DRP comprise four parts – a Backup Plan, a Recovery Plan, an Emergency

Plan & a Test Plan. The plan lays down the policies, guidelines, & procedures for all Information

System personnel.

2. Insurance:

Adequate insurance must be able to replace Information Systems assets & to cover the

extra costs associated with restoring normal operations. Policies usually can be obtained

to cover the resource like- Equipment Facilities, Storage Media, Valuable Papers

& Records, etc. ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 39: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Auditor’s Role inSecurity Management Controls

1. Auditors must evaluate whether security administrators are conducting ongoing, high-quality security reviews or not;

2. Auditors check whether the organizations audited have appropriate, high-quality disaster recovery plan in place; and

3. Auditors check whether the organizations have opted for an appropriate insurance plan or not.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 40: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Operations Management Controls

Responsible for the daily running of hardware and software facilities

Controls are required over functions like :

Computer operations, Data Preparation and Entry

Hardware and Software platforms

File library, Documentation and Program Library

1. Computer Operations:The controls over computer operations govern the activities that directly support the day-to-day execution ofeither test or production systems on the hardware/software platform available. Three types of control fallunder this category:

a. Operation control:These controls prescribe the functions that either human operators or automated operations facilitiesmust perform.

b. Scheduling Controls:These controls prescribe how jobs are to be scheduled on the hardware/software platform.

c. Maintenance Control:These controls prescribe how hardware is to be maintained in good operating order.

Operations Management typically performs controls over the following :

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 41: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

2. Network Operations:

This include the proper functioning of network operations & ,monitoring the performance of network communication channels, network devices, & network programs & files.

The primary components of a communication sub-system are as follows :

Communication lines Hardware Software Transmission disruption/corruption due to component

failure

3. Data Preparation & Entry:Irrespective of whether the data is obtained indirectly

from source documents or directly from, say, customers, keyboard environments & facilities should be designed to promote speed & accuracy & to maintain the well-being of keyboard operators.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 42: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

4. Production Control:• This includes the major functions like-receipt & dispatch of input & output; job scheduling; management of service level

agreements users; transfer pricing/charge-out control; & acquisition of computer consumables.

5. File Library:• This includes the management of an organization’s machine-readable storage media like magnetic types, cartridges, &

optical disks.

6. Documentation & Program Library: 1. This involves that documentation librarians ensure that documentation is stored securely; that only

authorized personnel gain access to documentation; that documentation is kept up-to-date & that adequate backup exists for documentation. The documentation may include reporting of responsibility & authority of each function;

2. Each IS function must be clearly defined & documented including system software, application software, database administration etc.

3. Policies establish the rules or boundaries of authority delegated to individuals in the enterprise. Procedures establish the instructions a that individuals must follow to compete their daily assigned tasks.

Documented Policies should exist in IS for use of IS resource; Physical Security, On-Line Security, Data Security, Use of Information System; Reviewing, Evaluating, & Purchasing Hardware & Software; System Development Methodology; & Application Program changes.

4. Job descriptions communicate management’s specific expectations for job performance. Job procedures establish instructions on how to do the job & policies define the authority of the employee.

5. Segregation of duties refers to the concept of distribution of work responsibilities such that individual employees are performing only the duties stipulated for their respective jobs & positions. IS

CA

by C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 43: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

7. Help Desk/ Technical support:• This assists end-users to employ end-user hardware & software such

as micro-computers, spreadsheet packages, database management packages etc. & also provides the technical support for production systems by assisting with problem resolution.

8. Capacity Planning & Performance Monitoring:• Regular performance monitoring facilities the capacity planning

wherein the resource deficiencies must be identified well in time so that they can be made available when they are needed.

9. Management of Outsourced Operations: • This has the responsibility for carrying out day-to-day monitoring of

the outsourcing contract.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 44: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Auditor’s Role in Operations Management Controls

1. Auditors should pay concern to see whether the documentation is maintained securely and that it is issued only to authorized personnel.

2. Auditors can use interviews, observations, and review of documentation to evaluate –a. The activities of documentation librarians;

b. How well operations management undertakes the capacity planning and performance monitoring function;

c. The reliability of outsourcing vendor controls;

d. Whether operations management is monitoring compliance with the outsourcing contract; and

e. Whether operations management regularly assesses the financial viability of any outsourcing vendors that an organization uses.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 45: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

SOFTWARE AND DATA BACK-UP TECHNIQUES System and data together, they are called total system’s back-up. System back-up may bea full back-up, an incremental back-up or a differential back-up.

1. Mirror back-up:• Identical to a full backup. • Files are not compressed in zip files & they cannot be protected with a password.• Mostly frequently used to create an exact copy of the backup data.AdvantagesThe backup is clean and does not contain old and obsolete files.DisadvantagesThere is a chance that files in the source deleted accidentally, by sabotage or through a virus may alsobe deleted from the backup mirror.

2. Incremental Backup:• Only the files that have changed since the last full backup/different backup or incremental

backup are saved. • Back up time & space - saved• Difficult to restore as you have to start with recovering the last full backup and every backup

taken sinceAdvantages• Much faster backups.• Efficient use of storage space. Much less storage space used compared to full and differential backupDisadvantagesRestores are slower than with a full backup and differential backups.Restores are a little more complicated. All backup sets (first full backup and all incremental backups)are needed to perform a restore.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 46: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

3. Differential Backup:• Contains all the files that have changed since the last full back up.• Faster & more economical in using the backup space, as only the files

thathave changed since the last full backup are saved.

• Advantages• Much faster backups then full backups.• More efficient use of storage space then full backups since only files changed

sincethe last full backup will be copied on each differential backup run.

• Faster restores than incremental backups.

• Disadvantages• Backups are slower then incremental backups.• Not as efficient use of storage space as compared to incremental backups. All

filesadded or edited after the initial full backup will be duplicated again with eachsubsequent differential backup.

• Restores are slower than with full backups.• Restores are a little more complicated than full backups but simpler than

incremental backups. Only the full backup set and the last differential backup areneeded to perform a restore.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 47: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

4. Full Backup:

• Large amount of data backed up – lot of time and space is required…..not a realistic proposition

• This is the simplest form of backup with a single restoring session for restoring all backed-up files.

• Advantages• Restores are fast and easy to manage as the entire list of files and folders are

in one backup set.• Easy to maintain and restore different versions.

• Disadvantages• Backups can take very long as each file is backed up again every time the full

backup is run.• Consumers the most storage space compared to incremental and differential

backups. The exact same files are stored repeatedly resulting in inefficient use of storage.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 48: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

In a risk assessment matrix, risks are placed on the matrix based on two criteria:

1. Likelihood: The probability of a risk or the occurrence of the disaster – On Y Axis

2. Consequences: The severity of the impact or the extent of damage caused by the risk – On X Axis

Likelihood of Occurrence

• Based on the likelihood of the occurrence of a risk, the risks can be classified under one of the following categories:

1. Define (scaled 3): A risk that is almost certain to show-up during project execution. If you’re looking at percentages a risk that is more than 80% likely to cause problems will fall under this category.

2. Likely (scaled 2): Risks that have 60-80% chances of occurrence can be grouped as likely.

3. Unlikely (scaled 1): Rare and exceptional risks which have a less than 10% chance of occurrence.

Consequences

• The consequences of a risk can again be ranked and classified into one of the following categories, based on how severe the damage can be.

1. Trivial/Insignificant (scaled 1): Risks that will cause a near negligible amount of damage to the overall progress of the project.

2. Minor (scaled 2): If a risk will result in some damage, but the extent of damage is not too significant.

3. Major (scaled 3): Risks with significantly large consequences which can lead to a great amount of loss are classified as critical.

4. Catastrophic (scaled 4): These are the risks which can make the project completely unproductive and unfruitful, and must be a top priority during risk management.

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 49: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

Risks are categorised as follows:

1. Inherent RiskInherent Risk is the measure of auditor’s assessment that may or may notbe material

vulnerabilities or gaps in the audit subject, exposing it to high risks before considering the

effectiveness of Internal Control.

Inherent Risk would be considered to be high if after ignoring Internal Control, there is high

likelihood of Risk exposure.

2. Control RiskControl Risk is the risk that will not be prevented or detected on a timely basis by Internal

Control. Control Risk is the measure of auditor’s assessment of the likelihood that risk

exceeding a tolerable level will not be prevented or detected by the clients Internal

Control system.

3. Detection RiskDetection Risk is the risk that the IT auditor’s substantive procedures will not detect an error.

The detection risk associated with identifying breaches in the security of an Application

System is ordinarily high as a log of whole period may not be available.

ISCA by CA KARTIK IYER IYER PROFESSIONAL ACADEMY CONTACT 9833867642

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 50: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

IS Audit and Audit Evidence

• SA 230, Audit Documentation refers to the -• Record of audit procedures performed,• Relevant audit evidence obtained and• Conclusions the auditor reached

• Audit working papers demonstrate the audit work from one year to another and also act as evidence for :• Means of controlling current audit work• Evidence of audit work performed• Schedules supporting or additional item in the accounts• Information about the business being audited, including the recent

history

ISCA by CA KARTIK IYER IYER PROFESSIONAL ACADEMY CONTACT 9833867642

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2

Page 51: BOMBAY CHARTERED A OUNTANTS’ SO IETY (BCAS) · PDF fileCC Environment {AMUL} Private Cloud Public Cloud Are also called Internal Cloud Provider Cloud Managed by Organisations IT

The inherent limitations of audit(SA-230)Includes:

1. The nature of financial reporting2. The nature of audit procedures3. The need for the audit to be conducted within a reasonable period of

time & at a reasonable cost4. The matter of difficulty, time or cost involved is not in itself a valid

basis for the auditor to omit an audit procedure for which there is no alternative or to be satisfied with audit evidence that is less than persuasive

5. Fraud, particularly fraud involving senior management collusion6. The existence & completeness of related party relationships &

transactions7. The occurrence of non compliance with laws & regulations8. Future events or conditions that may cause an entity to cease to

continue as a going concern.

ISCA by CA KARTIK IYER IYER PROFESSIONAL ACADEMY CONTACT 9833867642

ISC

A b

y C

A K

AR

TIK

IY

ER

BO

MB

AY

CH

AR

TER

ED A

CC

OU

NT

AN

TS’ S

OC

IET

Y

C

ON

TAC

T 9

83

38

67

64

2