Enterprise Information Systems (EIS) - Notes - CA Inter (New)
Enterprise Information Systems (EIS) - Notes - CA Inter (New)
Operational or Primary Processes deal with the core business and value
chain. These processes deliver value to the customer by helping to produce a
product or service. Operational processes represent essential business
activities that accomplish business objectives, e.g. generating revenue - Order
to Cash cycle (O2C), Procurement – Purchase to Pay (P2P) cycle.
b) Supporting Processes (or Secondary Processes)
Supporting Processes back core processes and functions within an
organization. Examples of supporting or management processes include
Accounting, Human Resource (HR) Management and workplace safety. One
key differentiator between operational and support processes is that support
processes do not provide value to customers directly. However, it should be
noted that hiring the right people for the right job has a direct impact on
the efficiency of the enterprise.
Example The main HR Process Areas are grouped into logical functional areas -
Recruitment and Staffing; Goal Setting; Training and Development;
Compensation and Benefits; Performance Management; Career Development
and Leadership Development.
c) Management Processes
(b)System Flowchart
• A System Flowchart represents the overall view of the data flow and operations of a
system, with a diagram drawn logically, and illustrates the correct flow of data or
documents.
• It represents flow of documents, the operations or activities performed, the persons
or workstations. It also reflects the relationship between Inputs, Processing and
Outputs.
• In a Manual System, a System Flowchart may comprise several Flowcharts, prepared
separately, such as Documents Flowchart, Activity Flowchart, etc.
• In a Computer System, the System Flowchart mainly consists of – (i) sources from
which input data is prepared and the medium or devices used, (ii) the processing steps
or sequence of operations involved, and (iii) the intermediary and final outputs
prepared and the medium and devices used for their storage.
(d)Program Flowchart
• Program Flowcharts are diagrammatic representation of the data processing steps to
be performed within a computer program.
• They are used to translate the elementary steps of a procedure into a program of
coded instructions for the Computer to operate effectively.
• They are used to depict the scientific, arithmetic and logical operations or steps which
must be accomplished to solve the computer application problem.
Flow Lines: The Symbols are linked by Flow Lines. A given Flow Line might represent
– (i) a Data Flow, (ii) a Control Flow, or (ii) a Hardware Interface.
Direction: By convention, the direction of flow is from the top left to the bottom right,
and
Arrowheads must be compulsorily used when that convention is not followed. However,
Arrowheads are recommended even when the convention is followed because they help
to clarify the documentation.
Symbols used in System Flowcharts are given below –
Text
Ite Description
m
(a) Events Events require no action from the Business as such, e.g. Customer Order,
Application for Credit Limit increase, etc.
(b) Activities These are the Entity’s Responses to the Events / Inputs, e.g. checking
of credit limit, checking of stock availability at Warehouse, etc. A
Processing Step or Activity is denoted by a Rectangular Box.
(c)Decision These are Decision Steps that have two types of responses – “Yes” or
Gateways “No”, and the further path of the process is decided based on such
response. These are denoted by Diamond Shapes.
(d) Arrows The Events, Activities and Decision Gateways are linked and inter–
connected by – (a) Solid Arrows (for Activity Flows), and (b) Dashed
Arrows (for Message / Information Flows).
8. Identify the Business Unit /Department/Person, that is responsible for each Step, for
creating various “Swimlanes”.
9. Draw the Flowchart based on the above linkages and processes, and obtain Final
Approval from the Entity.
18) What are the various types of Risk Management Strategies that may be
adopted by an Entity?
When risks are identified and analyzed, it is not always appropriate to implement
controls to counter them. Some risks may be minor, and it may not be cost effective to
implement expensive control processes for them. Risk management strategy is
explained below:
• Tolerate/Accept the risk: One of the primary functions of management is
managing risk. Some risks may be considered minor because their impact
and probability of occurrence is low. In this case, consciously accepting the
risk as a cost of doing business is appropriate, as well as periodically reviewing
the risk to ensure its impact remains low.
• Terminate/Eliminate the risk: It is possible for a risk to be associated with
the use of a technology, supplier, or vendor. The risk can be eliminated by
replacing the technology with more robust products and by seeking more
capable suppliers and vendors.
• Transfer/Share the risk: Risk mitigation approaches can be shared with
trading partners and suppliers. A good example is outsourcing infrastructure
management. In such a case, the supplier mitigates the risks associated
with managing the IT infrastructure by being more capable and having access
to more highly skilled staff than the primary organization. Risk also may be
mitigated by transferring the cost of realized risk to an insurance provider.
• Treat/mitigate the risk: Where other options have been eliminated,
suitable controls must be devised and implemented to prevent the risk from
manifesting itself or to minimize its effects.
• Turn back: Where the probability or impact of the risk is very low, then
management may decide to ignore the risk.
19) What legal and regulatory compliances are called for in case of Business
Process Automation?
Legal, Regulatory and Compliance Requirements in relation to BPA and Risk Management
include the following –
• Directors’ Responsibility Statement in relation to Maintenance of Accounting
Records, Internal Financial Controls, [Sec.134 of Companies Act, 2013],
• Reporting Requirements of Auditors in relation to Maintenance of Accounting
Records, Internal Financial Controls, [Sec.143 of Companies Act, 2013],
• Corporate Governance Requirements under Companies Act, 2013, Compliance
with the requirements of the Information Technology Act, 2000.
(b) Transmission: Risk that all the Files and Data transmitted may not be
processed accurately and completely, due to Network error or system failure.
(c) Processing: Risk that valid input data may not be processed properly due to
program errors or other reasons.
(d) Output: Risk that output is not complete and accurate, or risk that output is
distributed to Unauthorized Personnel.
(f) Backup: Risk that all data & programs may be lost if there is no proper backup
in the event of a disaster and the Entity’s Operations could come to a standstill, due
to lack of adequate infrastructure settings.
Manual Both (a) and (b) are done by Both (a) and (b) are done by
manual processes. manual processes.
Automated Both (a) and (b) are done by Both (a) and (b) are done by
System Verification. System Verification.
(e) helps in ensuring the accuracy and completeness of the accounting records,
(h) helps the reliability of internal and external Financial Reporting on timely basis.
➢ Configuration will define how software will function and what menu options are
displayed.
Masters
➢ Masters refer to the way various parameters are set up for all modules of software,
like Purchase, Sales, Inventory, and Finance etc.
➢ The masters are set up first time during installation and these are changed
whenever the business process rules or parameters are changed. Examples are
Vendor Master, Customer Master, Material Master, Accounts Master, Employee
Master etc.
example: The Customer Master will have the credit limit of the customer. When
an invoice is raised, the system will check against the approved credit limit and if
the amount invoiced is within the credit limit, the invoice will be created if not the
invoice will be put on “credit hold” till proper approvals are obtained.
Transactions
➢ Transactions refer to the actual transactions entered through menus and functions
in the application software, through which all transactions for specific modules are
25) Write short notes on review of BPA from Risk and Control Perspectives?
Implementation or review of specific business process can be done from risk or control
perspective
(a) Risk Perspective
1. Each key sub–process or activity performed in a Business Process should be examined,
to look at existing and related control objectives and existing controls and the
residual risks after application of controls.
2. The Residual Risk should be knowingly accepted by the Management
26) Explain a few Risks and Control Objectives in O2C Process at Masters
Level?
Risks and Controls related to the Order to Cash (O2C) business process are as
follows:
Master Level
Risks Controls
The customer master file is not maintained The customer master file is maintained
properly and the information is not properly and the information is accurate.
accurate.
Invalid changes are made to the customer Only valid changes are made to the
master file. customer master file.
All valid changes to the customer master All valid changes to the customer master
file are not input and processed. file are input and processed.
Changes to the customer master file are Changes to the customer master file are
not accurate. accurate.
Changes to the customer master file are Changes to the customer master file are
not processed in a timely manner. processed in a timely manner.
Customer master file data is not up-to- Customer master file data is up to date
date and relevant. and relevant.
Risk Control
Orders are processed exceeding Orders are processed only within
customer credit limits without approvals. approved customer credit limits.
Orders and cancellations of orders are Orders and cancellations of orders are
not input accurately. input accurately.
Order entry data are not transferred Order entry data are transferred
completely and accurately to the completely and accurately to the
shipping and invoicing activities. shipping and invoicing activities.
All orders received from customers are All orders received from customers are
not input and processed. input and processed.
Invalid and unauthorized orders are Only valid and authorized orders are
input and processed. input and processed.
28) Explain a few Risks and Control Objectives in P2P Process at Masters Level?
Risks and Controls related to the Order to Cash (P2P) business process are as follows:
Master Level
Risk Control
Unauthorized changes to supplier master Only valid changes are made to the
file. supplier master file.
All valid changes to the supplier master All valid changes to the supplier master
file are not input and processed. file are input and processed.
Changes to the supplier master file are not Changes to the supplier master file are
correct. accurate.
Changes to the supplier master file are Changes to the supplier master file are
delayed and not processed in a timely processed in a timely manner.
manner.
Supplier master file data is not up to date. Supplier master file data remain up to
date.
System access to maintain vendor System access to maintain vendor
masters has not been restricted to the masters has been restricted to the
authorized users. authorized users.
29) Explain a few Risks and Control Objectives in P2P Process at Transactions
Level?
Risk Control
Unauthorized purchase requisitions are Purchase orders are placed only for
ordered. approved requisitions.
Purchase orders are not entered Purchase orders are accurately entered.
correctly in the system.
Purchase orders issued are not input and All purchase orders issued are input and
processed. processed.
Amounts for goods or services received All amounts for goods or services
are not input and processed in accounts received are input and processed to
payable. accounts payable.
30) Explain a few Risks and Control Objectives in Inventory Process at Masters
Level?
Risks and Controls related to the Inventory process are as follows:
Master Level
Risk Control
Invalid changes are made to the Only valid changes are made to the
inventory management master file. inventory management master file.
Inventory management master file data Inventory management master file data
is not up to date. remain up to date.
Risk Control
Adjustments to inventory prices or Adjustments to inventory prices or
quantities are not recorded accurately. quantities are recorded accurately.
Raw materials are received and accepted Raw materials are received and accepted
without valid purchase orders. only if they have valid purchase orders.
Raw materials received are not recorded Raw materials received are recorded
accurately. accurately.
Raw materials received are not recorded All raw materials received are recorded.
in system.
Receipts of raw materials are not recorded Receipts of raw materials are recorded
promptly and not in the appropriate promptly and in the appropriate period.
period.
Defective raw materials are not returned Defective raw materials are returned
promptly to suppliers. promptly to suppliers.
The Human Resources (HR) Life Cycle refers to human resources management and
covers all the stages of an employee’s time within a specific enterprise and the
role the human resources department plays at each stage. Typical stage of HR
cycle includes the following:
(b) Recruiting and On-boarding: Recruiting is the process of hiring a new
employee. The role of the human resources department in this stage is to
assist in hiring. This might include placing the job ads, selecting candidates
whose resumes look promising, conducting employment interviews and
administering assessments such as personality profiles to choose the best
applicant for the position. On boarding is the process of getting the
successful applicant set up in the system as a new employee.
(c) Orientation and Career Planning: Orientation is the process by which
the employee becomes a member of the company’s work force through
learning her new job duties, establishing relationships with co-workers and
supervisors and developing a niche. Career planning is the stage at which
the employee and her supervisors work out her long-term career goals with
the company. The human resources department may make additional use of
personality profile testing at this stage to help the employee determine her
best career options with the company.
(d) Career Development: Career development opportunities are essential to
keep an employee engaged with the company over time. After an employee,
has established himself at the company and determined his long-term career
objectives, the human resources department should try to help him meet his
goals, if they’re realistic. This can include professional growth and training to
prepare the employee for more responsible positions with the company. The
company also assesses the employee’s work history and performance at this
34) Explain a few Risks and Control Objectives in HR Process at Masters Level?
Risks and Control Objectives for Human Resource Process at Master Levels are as
follows:
Risk Control Objective
Additions to the payroll master files do not Additions to the payroll master files
represent valid employees. represent valid employees.
New employees are not added to the All new employees are added to the
payroll master files. payroll master files.
Deletions from the payroll master files do Deletions from the payroll master files
not represent valid terminations. represent valid terminations.
Invalid changes are made to the payroll Only valid changes are made to the
master files. payroll master files.
36) Explain a few Risks and Control Objectives in Fixed Assets Process at Masters
Level?
Risks and Control Objectives for Fixed Asset Management Process at Master Levels are
as follows:
Risk Control Objective
Invalid changes are made to the fixed Only valid changes are made to the
asset register and/or master file. fixed asset register and/or master
file.
Valid changes to the fixed asset register All valid changes to the fixed asset
and/or master file are not input and register and/or master file are input
processed. and processed.
Changes to the fixed asset register Changes to the fixed asset register
and/or master file are not accurate. and/or master file are accurate.
Fixed asset register and/or master file Fixed asset register and/or master
data are not kept up to date. file data remain up to date.
System access to fixed asset master file System access to fixed asset master
/ system configuration is not restricted to file / system configuration is
the authorized users. restricted to the authorized users.
37) Explain a few Risks and Control Objectives in Fixed Assets Process at
Transactions Level?
Risks and Control Objectives for Fixed Asset Management Process at Transaction Levels
are as follows:
Risk Control Objective
Fixed asset acquisitions are not Fixed asset acquisitions are
accurately recorded. accurately recorded.
Fixed asset acquisitions are not recorded Fixed asset acquisitions are recorded
in the appropriate period. in the appropriate period.
Fixed asset acquisitions are not All fixed asset acquisitions are
recorded. recorded.
Depreciation charges are not recorded in All depreciation charges are recorded
the appropriate period. in the appropriate period.
Fixed asset disposals/transfers are not All fixed asset disposals/transfers are
recorded. recorded.
39) Explain a few Risks and Control Objectives in General Ledger Process
at Configuration Level?
Risks and Control Objectives for General Ledger at Configuration Levels are as follows:
40) Explain a few Risks and Control Objectives in General Ledger Process at
Masters Level?
Risks and Control Objectives for General Ledger at Master Levels are as follows:
41) Explain a few Risks and Control Objectives in General Ledger Process at
transactions Level?
Risks and Control Objectives for General Ledger at Transaction Levels are as follows:
• Trading Business – Trading simply means buying and selling goods without
any modifications, as it is. Hence inventory accounting is a major aspect in this
case. Purchase and sales transactions cover major portion of accounting. This
industry requires accounting as well as inventory modules.
• Service Business – This type of business does not have any inventory. It is
selling of skills/knowledge/Efforts/time. Eg: Doctors, Architects, Chartered
Accountants, are the professionals into service business. There may be other
type of business into service, i.e. courier business, security service, etc. This
industry does not require inventory module.
(3) What are the types of Accounting Vouchers? Explain from a Software
Perspective?
A Voucher Number or a Document Number is a unique identity of any
voucher/document. A voucher may be identified or searched using its unique voucher
number. Let us understand some peculiarities about voucher numbering.
• Voucher number must be unique.
• Every voucher type shall have a separate numbering series
• A voucher number may have prefix or suffix or both, e.g.
ICPL/2034/17-18. In this case “ICPL” is the prefix, “17-18” is the suffix
and “2034” is the actual number of the voucher.
• All vouchers must be numbered serially, i.e. 1,2,3,4,5,6 and so on.
• All vouchers are recorded in chronological order and hence voucher
recorded earlier must have an earlier number, i.e. if voucher number
for a payment voucher having date as 15thApril 2017 is 112, voucher
number for all the vouchers recorded after this date shall be more than
Financial Trial
Statement Balance
Note: Sometimes, certain transactions may be generated by the System itself, e.g.
Depreciation, Interest, etc. In certain situations, there may be additional processes
from Trial Balance to Financial Statements, viz.
• Trial Balance is first prepared without adjustments,
• Adjustments are made after due approval,
• Adjusted Trial Balance is prepared,
• Closing Entries are passed after finalization of Trial Balance. This is used for
Financial Statements
Balance Sheet
(6) What are the types of Accounting Vouchers? Explain from a Software
Perspective?
Voucher is a place where transactions are recorded. It is a data input form for
inputting transaction data. In accounting, there may be different types of
transactions; hence we use different voucher types for recording of different
transactions. Generally following types of Accounting vouchers are used in accounting
systems as shown
Module - Accounting
9 Memorandum For recording of transaction which will be in the system but will
not affect the trial balance.
(8) What are the types of Master Data in the context of Accounting System?
Types of Master Data in the context of Accounting System
a. Accounting Master Data – This includes names of ledgers, groups, cost
centers, accounting voucher types, etc.
E.g. Capital Ledger is created once and not expected to change frequently.
Similarly, all other ledgers like, sales, purchase, expenses and income
ledgers are created once and not expected to change again and again.
Opening balance carried forward from previous year to next year is also a
part of master data and not expected to change.
E.g. If a person is into the business of dealing in white goods, stock items
shall be Television, Fridge, Air Conditioner, etc. For a person running a
medicine shop, all types of medicines shall be stock items for him/her.
c. Payroll Master Data – Payroll is another area connecting with Accounting
Systems. Payroll is a system for calculation of salary and recoding of
transactions relating to employees. Master data in case of payroll can be
names of employees, group of employees, salary structure, pay heads, etc.
These data are not expected to change frequently.
E.g. Employee created in the system will remain as it is for a longer period
of time, his/her salary structure may change but not frequently, pay heads
associated with his/her salary structure will be relatively permanent.
E.g. Goods and Service Tax (GST), Nature of Payments for Tax Deducted at
Source (TDS), etc. This data also shall be relatively permanent.
Purpose It is meant for handling requests It is meant for storing and handling
from Users. the data.
Software User can access the Software only User can access the Software 24 x 7
Access from the Computer where it is without Hardware Restrictions, i.e.
(16) What are the major Modules that are integrated in an ERP System?
Modules in an ERP
An ERP System maintains in a Single Database, the data needed for a variety of
business functions (or Software Modules) such as Manufacturing, Supply Chain
Management, Financials, Projects, Human Resources and Customer Relationship
Management. So, the Software Modules in an ERP can include –
Supply Chain Management (SCM) – Inventory, Supply Chain Planning, Supplier
Scheduling, Claim Processing, Order
Entry, Purchasing, etc.
Manufacturing– Production Planning, Engineering, Capacity, Workflow
Management, Quality Control, Bills of Material, Manufacturing Process, etc.
Customer Relationship Management (CRM) – Enquiry Handling, Targeted
Marketing, Quotation, Order
Management, Delivery Management, Customer Service, Receivables Follow up,
etc.
Projects – Costing, Billing, Activity Management, Time and Expense, etc.
Human Resources – Employee Benefits, Training, Payroll, Time and
Attendance, etc.
Financials – Accounts Payable, Accounts Receivable, Fixed Assets, General
Ledger, Cash Management, etc.
(18) Write a short note on risk and corresponding control related to People
issues.
Aspect Risk associated Control required
Change Change will occur in the Proper training of the users
management employee’s job profile in terms of with well documented
some jobs becoming irrelevant manuals. Practical hands on
and some new jobs created. training of the ERP System
should be provided so that
the transition from old system
to ERP system is smooth and
hassle free.
Training Since the greater part of the Training is a project-
raining takes place towards the managed activity and shall be
end of the ERP implementation imparted to the users in an
cycle, management may curtail organization by the skilled
the training due to increase in the consultants and
overall cost budget. representatives of the
(19) Write a short note on risk and corresponding control related to Process risk.
Aspect Risk associated Control required
Program There could be a possibility of an This requires bridging the
Management information gap between day-to- information gap between
day program management traditional ERP-based
activities and ERP-enabled functions and high value
functions like materials and operational management
procurement planning, logistics functions, such applications
and manufacturing. can provide reliable real-
time information linkages to
enable high-quality decision
making.
Business BPR means not just change – This requires overhauling of
Process but dramatic change and organizational structures,
Reengineering dramatic improvements. management systems, job
(BPR) descriptions, performance
measurements, skill
development., training and
use of IT.
(21) Write a short note on risk and corresponding control related to Technology
risk.
Aspect Risk associated Control required
Lengthy ERP projects are lengthy that Care must be taken to keep
implementation takes anywhere between 1 to 4 the momentum high and
time years depending upon the size enthusiasm live amongst
of the organization. Due to the employees, so as to
technological developments minimize the risk.
happening every day, the
business and technological
environment during the start
and completion of the project
will never be the same.
Employee turnover is another
problem.
• Input Validations – This stand for checking of rules for input of data into the
system. E.g. a transaction of cash sales on sales counter must not be recorded
in a date other than today (not a future date or a back date), amount field
must not be zero, stock item field shall not be empty, etc. Input validations
shall change according to each data input form.
(23) Write short notes on the Finance and Accounting (FA) Module of an ERP
System?
Financial Accounting Module
This module is the most important module of the overall ERP System and it connects
all the modules to each other. Every module is somehow connected with module.
Following are the key features of this module:
Tracking of flow of financial data across the organization in a controlled
manner and integrating all the information for effective strategic
decision making.
Creation of Organizational Structure (Defining Company, Company
Codes, business Areas, Functional Areas, Credit Control, Assignment
of Company Codes to Credit Controls).
Financial Accounting Global Settings (Maintenance of Fiscal Year,
Posting Periods, defining Document types, posting keys, Number
ranges for documents).
General Ledger Accounting (Creation of Chart of Accounts, Account
groups, defining data transfer rules, creation of General Ledger
Account).
Tax Configuration & Creation and Maintenance of House of Banks.
Account Payables (Creation of Vendor Master data and vendor-
related finance attributes like account groups and payment terms).
Account Receivables (Creation of Customer Master data and
customer- related finance attributes like account groups and
payment terms.
Asset Accounting.
Integration with Sales and Distribution and Materials Management.
(25) Write short notes on the Sales and Distribution (SD) Module of an ERP
System?
Sales and Distribution Module: Sales and Distribution is used by organizations to
support sales and distribution activities of products and services, starting from
enquiry to order and then ending with delivery.
Key features of Sales and Distribution Module are discussed as under:
Setting up Organization Structure: Creation of new company, company
codes, sales organization, distribution channels, divisions, business area,
plants, sales area, maintaining sales offices, storage location;
Assigning Organizational Units: Assignment of individual components
created in the above activities with each other per design like company code
to company, sales organization to company code, distribution channel to
sales organization, etc.;
Defining Pricing Components: Defining condition tables, condition types,
condition sequences;
Setting up sales document types, billing types, and tax-related components;
and
Setting up Customer master data records and configuration.
(27) Write short notes on the Production Planning (PP) Module of an ERP
System.
Production Planning Module:
Process: Production Planning (PP) Module involves the following processes –
• Issue of Raw Material from Stores Department to Production Departments,
• Conversion of Raw Materials into WIP,
• Conversion of WIP into Finished Goods, (including handling out–
sourced processes, components, etc.) Primary Packing of Finished
Goods,
• Transfer of Packed Finished Goods into Warehouse.
(28) Write short notes on the Materials Management (MM) Module of an ERP
System?
Material Management (MM) Module involves the following processes /activities –
➢ Purchase Requisition: Production Department (or Stores Department)
sends a request to Purchase Department for purchase of the Raw Materials
required for production.
➢ Scrutiny: Purchase Department evaluates the Requisition with current stock
position and Purchase Order pending position, and decides about accepting
or rejecting the requisition.
➢ Quotation: If the Requisition is accepted, Purchase Department seeks
Quotations from prospective Vendors for supply of Raw Materials.
➢ Analysis of Quotations: Quotations received from Vendors are compared and
evaluated, on various aspects.
➢ Purchase Order: Terms of Purchase are informed to the selected Vendors
through the Purchase Order (PO), which provides details of –(i) Description
of items to be purchased, (ii) Quantity, (iii) Price, (iv) Time of Delivery, (v)
Place of Delivery, (vi) Payment Terms, (vii) Special Instructions, if any, etc.
➢ Material Receipt: Materials are received as per PO, after proper inspection
thereof. A Material Receipt Note (MRN)or Goods Receipt Note (GRN) is prepared
to increase the Stock Balance, after receipt of materials.
➢ Issue of Materials: Material received by Stores Department is issued to
Production Departments as per requirement. A Bill of Materials (BOM) or
Stores Requisition Note (SRN) is prepared for this purpose.
➢ Purchase Invoice: Invoice received from Vendor is recorded in the Books,
resulting in a Liability (Payable) to the Vendor towards goods purchased.
➢ Payment to Vendor: Payment is made to Vendor based on Purchase Invoice,
after verifying with GRN and PO.
(29) Write short notes on the Quality Management (QM) Module of an ERP
System?
Quality Management Module
This module helps an organization to accelerate their business by adopting a
structured and functional way of managing quality in different processes.
QM Process includes the following activities –
➢ Setting Master Data and Standards for quality management,
➢ Setting Quality Targets,
➢ Preparing a Quality Management Plan,
➢ Establishing measurement norms for Quality Targets,
➢ Creating a Reporting System for measuring actual quality achieved,
compliance levels, etc.
➢ Identifying Quality Issues and improvements and changes to be made
(including Training, Re–design, etc.),
(30) Write short notes on the Plant Maintenance (PM) Module of an ERP
System?
Plant Maintenance (PM) is a functional module which handles the maintaining of
equipment and enables efficient planning of production and generation schedules.
Process: PM Process includes the following –
(a) Creating Masters in respect of –(i) Various items of Machinery and their Spare
Parts, (ii) Maintenance Data, (iii) Schedule of Preventive Maintenance,
(b) Monitoring whether the Maintenance activities are actually performed as per
Planned Schedules,
(c) Organizing Special / Break–down Maintenance to handle outages, etc.
Key Features: PM Module –
(a) handles the maintaining of equipment and enables efficient planning of
production and generation schedules,
(b) ensures cost–efficient maintenance methods, viz. Risk–Based
Maintenance or Preventive Maintenance,
(c) provides comprehensive Outage Planning, and powerful work order
management,
(d) creates various Reports including – (i) PM Reminders, (ii) Monthly PMs,
(iii) Maintenance Histories, (iv) PM Schedules, (v) Plant/ Equipment Masters,
etc.
(31) Write short notes on the Project Systems (PS) Module of an ERP
System?
PS Module is an Integrated Project Management Tool used for planning and managing
projects. Project Management Tools include – (a)Cost and Planning Budget, (b)
Project Scheduling, (c) Requisitioning of Materials and Services, etc. Project Systems
Activities include – (a) Handling Project Requests, (b) Project Planning and
Sanction, (c) Project. Budgeting, (d) Project Monitoring, (e) Project Implementation,
and (f) Project Completion / Sign–off.
In Project System, each process has a defined set of tasks to be performed known
as process flow in Project Lifecycle. When a project request is received, a project
is created and it undergoes the following steps in project process flow/ lifecycle.
Finance & A/cg ➢ Integration takes place in areas like Material Valuation,
(FA) Vendor Payments, Material Costing, etc.
And Controlling ➢ If any Inventory Posting is done, GL Accounts
(CO) (Suppliers) are updated online by the System.
➢ Transport (Logistics) Invoice Verification will create
Vendor Liability in Vendor A/c immediately on posting
the document.
Production ➢ Integration takes place in areas like Material
Planning (PP) Requirement Planning, Receipts/Issues against
Production Orders, Availability Check for Stocks, etc.
➢ Material Requirement Planning isgenerates planned
Orders or Purchase Requisitions which can be converted
to Purchase Orders/Contracts, based on Stocks,
expected Receipts, expected Issues.
Sales ➢ Integration takes place in areas like Delivery,
&Distribution Availability Check, Stock Transfer Requirements, etc.
(SD) ➢ When a Sales Order is created, it can initiate a dynamic
Availability Check of Stocks on hand.
(35) Write short notes on “Reports” in the context of Finance and Accounting
Systems?
Reports: A Report is a presentation of information in proper and meaningful way.
So, Reporting System is a system of regular reporting on the pre–decided aspects.
(d) Periodic Internal Management Reports – (i) Variance Reports, (ii) Budget vs
Actual, (iii) Year to Date reports, etc. used for internal evaluation and control
function.
(36) What are the features of MIS Reports? How should information be
presented in MIS Reports?
Meaning: A MIS Report is a tool that Managers use to evaluate Business
Processes and Operations. MIS Reports generated by the Entity’s IT Systems, are
used by Business Managers at all levels of an Entity, to help them evaluate their
business’ daily activities or problems that arise, make decisions, and track progress
Features of MIS Reports: MIS Reports can be –
➢ auto–generated by the IT System on periodic basis (e.g. Daily Stock
Report), or generated on–demand basis,
➢ generated by the specific Manager at his end, or can be generated by a
specialized MIS Department, if any,
➢ customized to provide relevant information in user–friendly fashion,
including Spreadsheets, etc.
➢ made specific to each Functional Unit / Division, e.g. Production, Despatch,
Sales, Accounts, HR, etc.
❖ Timeliness: The information should be available at the right time for the
Decision Maker / Manager,
❖ Adequacy: The information should be adequate to meet the requirements of the
Decision Maker / Manager,
❖ Purposive: The basic purpose of a MIS Report is to inform, evaluate,
persuade and organize. MIS Information must be purposeful, when it is given
to a Manager in the Entity.
❖ Frequency: The frequency with which the MIS Report is transmitted or
received affects its value. Frequency is related to both the – (a) level of
management, and (b) operational need.
❖ Relevant: MIS Reports need to be specific to the business area they address.
A Report that includes unnecessary information might be ignored.
❖ Structured: Information in an MIS Report should be understandable to the
Manager using it.
(37) Explain the concept of Data Analytics, and the steps involved therein?
Data Analytics: It is the process of examining data sets to draw conclusions about
the information they contain, increasingly with the aid of specialized systems and
software. Data Analytics predominantly refers to an assortment of applications, from
basic Business Intelligence (BI), Reporting and Online Analytical Processing (OLAP)
to various forms of advanced analytics.
Steps in Data Analytics:
(a) Data Collection
Identification of the information required for an analytics application.
Assembling the required information. Combining the data using Data Integration
Routines, and transforming into a common format. Loading the Data into an
Analytics System.
(b)Data Organizing
Finding and fixing data quality problems. Running Data Profiling and Data
Cleansing jobs to ensure consistency of information. Manipulating and
organizing the data for the planned analytics use. Applying Data Governance
Policies to ensure that the data is being used properly.
(c) Modelling and Training
Building of an analytical model, by a Data Scientist, using predictive modeling tools
or other analytics software and programming languages (e.g. Python, Scala, R and
SQL). Running the model against a partial data set to test its accuracy. Revising
and running the model again and again, until it functions as intended.
(d)Data Analytics
The Model is run in Production Mode against the full data set, to address a specific
information need or on an ongoing basis as the data is updated.
(e) Reporting
Communicating the results generated by Analytical Models to Executives and End–
Users to aid in their decision–making it can be made easier to understand and quick
to grasp by creating Charts and Infographics using Data Visualization Techniques.
• BI uses both historical information as well as new data from various source systems.
• BI can support both strategic and tactical decision–making processes.
(41) Can the same software be used for Accounting and Tax Compliance also?
Explain?
Regulatory compliance and accounting systems are closely connected with each
other. Most of the regulatory compliance requires accounting data and accounting
data comes from accounting systems. E.g. Income tax returns are prepared based
on accounting data only. There may be two approaches for making compliances
requiring accounting data.
Software is needed for tax compliances as almost all the tax compliance today
is through electronic mode only. If separate software is used for accounting and
tax compliance, we need to put data in tax compliance software either manually
or electronically.
Sl. Particular Accounting & Tax Only Tax Compliance
No s Compliance Software Software
Only users or
devices with
the required
A central The owner of
information Offers
authority a protected
security Used in individuals
regulates system or
clearance can Government complete
access rights resource sets
access and Military control over
based on policies
protected institutions the resources
multiple levels defining who
resources but they own.
of security can access it.
cannot
alter/share
the resources.
A System
Item Description
1. People The end–objective of the CBIS is to be useful to people. People
cover all type of persons, within and outside the Entity.
2. Hardware (a) Hardware consists of Physical Components including
Computer System, i.e. CPU, and all of its support equipment, i.e.
peripherals e.g. Input Devices, Storage Devices, and
Communications Devices. It includes Server or Smart Terminals
with different configurations and Processors, etc.
(b) Hardware Resources refer to – (i) Machines – Computers,
Video Monitors, Magnetic Disk Drives, Printers, Optical Scanners,
and (ii) Media – Floppy Disks, Magnetic tape, Optical Disks, Plastic
Cards, Paper Forms, etc.
3. Software (a) Software consists of Computer Programs and their User
Documentation or Manuals.
(b) Programs are machine–readable instructions that direct the
CBIS Hardware to produce useful information from data.
(c) Software includes – (i) different types of Operating Systems
like UNIX, LINUX, WINDOWS, etc. (ii)Application Software
An Information System Model involves the following steps. These basic activities of an
Information System help Entities in making decisions, control operations, analyse
problems and create new products or services
Concept These are the systems where These are systems where
the level of manual Computers are used at every
intervention is very high, with stage of transaction
little or no room for Computer processing. Human
Processing. intervention is very limited, or
sometimes even Nil.
Item Description
People The end–objective of the CBIS is to be useful to people. People
cover all type of persons, within and outside the Entity.
Data a) Data are facts that are used by programs to produce useful
information. Like Programs, Data are generally stored in machine–
readable form on disk or tape until the Computer needs them.
b) Data may be alphanumeric, text, image, video, audio and other
forms.
c) In a CBIS, Data is organized in terms of a Database Management
System (DBMS).
(b) Processing Devices: Processing Devices refer to computer chips that contain
the Central Processing Unit (CPU or Microprocessor) and Main Memory.
• CPU is the actual hardware that interprets and executes the program
(software) instructions and coordinates how all the other hardware devices
work together.
• CPU is built on a small flake of silicon and can contain the equivalent of
several million transistors. Transistors can be viewed as switches which could
be” on” or “off”, i.e. taking a value of 1 or 0 respectively.
• CPU is the brain of the computer, and its main function is to execute programs
stored in memory.
• CPU consists of three functional units –
I. Control Unit (CU): CU controls the flow of data and instruction to
and from memory, interprets the instruction and controls which tasks
to execute and when.
II. Arithmetic and Logical Unit (ALU): ALU performs various
arithmetic operations (e.g. addition, subtraction, multiplication,
division, etc.), and logical operations (e.g. comparison of numbers:
Equal to, Greater than, Less than, etc.)
III. Registers: These are high speed memory units within CPU for storing
small amount of data (mostly 32 or 64 bits).
Registers could be –
(c) Data Storage Devices: These refer to the memory where data and programs
are stored. Some of the types of memory techniques / devices are –
Type Description
Registers are internal memory within CPU, which are very
Internal Memory fast, but very small.
a) Primary Memory (Main Memory) is used by CPU for
execution of programs
b) In Main Memory, any location can be accessed in any
order (in contrast with sequential order).
Primary Memory c) Main Memory is not used for storing data, and is
generally small in terms of storage capacity.
d) Main Memory is primarily of two types – RAM and ROM
a) Cache is a smaller, faster memory, which stores copies
of the data from the most frequently used Main Memory
locations, so that Processor/Registers can access it more
Cache Memory
rapidly than Main Memory.
(d) Output Devices: These are devices through which the Computer provides
output / information to the User / Decision–maker. Output may be classified
into the following types –
Textual Output –characters that are used to create words, sentences, and
paragraphs.
Graphical Outputs – drawings, charts, photographs, and animation, which
provide digital representations of non–text information.
Tactile Output – e.g. Raised Line Drawings which may be useful for visually
challenged persons.
Audio Output – music, speech, or any other sound.
Video Output – Images played back at speeds to provide the appearance of
full motion.
(11) What are the activities and functions of System Software and
Operating Systems? System Software is the Computer Software that is designed
to operate the computer hardware, and to give and maintain a platform for running
Application Software. Computer Operating Systems is one of the widely used System
Software.
Functions / Activities:
Significance:
Relationship Example
One : One In a Multi–Speciality Hospital, the Doctor sees a
patient and writes a prescription for that patient.
One : Many A Doctor sees many patients and writes prescriptions
for each person separately
Many : One Many Specialist Doctors see a single patient.
Many : Many The Billing Section of the Hospital processes the bills
of different patients from different doctors.
(16) List a few merits and demerits of DBMS.
Merits of DBMS: -
Demerits of a DBMS: -
a) Here, the records are logically organized into a hierarchy of relationships and
involve an inverted tree structure.
b) The Tree is composed of a hierarchy of Nodes, the uppermost node is called the
Root (Top Parent Record).
c) A Node which has other dependent nodes is called Parent while the dependent
nodes are called as Children.
d) With the exception of the Root, every Node is related to a Node at a higher level
called its Parent.
e) No Child Record can have more than one Parent Record. However, each Parent
Record can have multiple lower level (Child) records.
(a) Big data: Big Data refers to massive and huge data sets, that traditional
Database–Management tools do not have the processing power to analyse them.
Storing, analysing, processing and interpreting such data requires the best tools
and techniques based on advanced technology. Examples: Details of Cash Deposits
and Withdrawals in the Banking System during a period, Item– wise Details of
Sweets sold by an Entity during a festival season, etc.
(b) Data warehouse: Data from an Entity’s Database(s) that support its day–to–day
operations are extracted periodically and sent to a Data Warehouse [i.e. a “Master
Database”] for storage and analysis. A Data Warehouse should be designed so that
it meets the following criteria –
(i) It uses Non–Operational data, i.e. data which is not required for day–to–day
operations.
(ii) It is updated on scheduled basis, i.e. current data from an Entity’s Active /
Operational Databases are pulled into the Data Warehouse on a regular,
scheduled basis.
(iii) It contains time–variant data, i.e. whenever data is loaded into the Data
Warehouse, it receives a time stamp, which allows for comparisons between
different time periods.
(iv) It uses standardised data, drawn from multiple Database(s) in the Entity. If the
data format is not the same amongst these Databases, it is first converted into
a standard format using Extraction–Transformation–Load (ETL) Process.
(i) Bottom–Up Approach builds small Data Warehouses, called Data Marts, to
solve specific business problems initially. All these Data Marts are then integrated
into a larger Data Warehouse.
(ii) Top–Down Approach leads to the creation of an Entity–wide Data Warehouse
and subsequent creation of smaller Data Marts from the bigger Warehouses, to
address specific business needs.
(c) Data mining: Data Mining is the process of analysing data to find previously
unknown trends, patterns, and associations to make decisions. Data Mining is
achieved through automated means, in extremely voluminous and large data sets,
such as a Data Warehouse. Data Mining may be approached from two angles –
Examples: Income Tax Department mines data of higher amounts of Cash Deposits
/ Withdrawals in the Banking System, to identify potential taxpayers.
SoD Concept seeks to ensure that a single individual does not possess excess privileges,
that could result in unauthorized/harmful activities like fraud or the manipulation or
exposure of sensitive data.
Example: In the area of Payment Processing, the activities of – (i) Creation of Vendor
Code, (ii)Authorisation of Vendor’s Bills, and (iii) Printing of Cheques are handled by
separate individuals.
SoD Controls –
are in the nature of Preventive and Detective Controls place to manage segregation
of duties matters.
can be manual or even automated, depending on the nature of transaction,
situation, and sometimes require manual intervention in an automated control.
(i) Recruiting: When the organization needs to find someone to fill an open position,
the use of standard job titles will help prospective candidates more easily find
positions that match their criteria.
(ii) Compensation base lining: Because of the chronic shortage of talented IT
workers, organizations are forced to be more competitive when trying to attract new
workers. To remain competitive, many organizations periodically undertake a
regional compensation analysis to better understand the levels of compensation
paid to IT workers in other organizations. The use of standard job titles makes the
task of comparing compensation far easier.
(iii) Career advancement: When an organization uses job titles that are consistent in
the industry, IT workers have a better understanding of the functions of positions
within their own organizations and can more easily plan how they can advance. The
remainder of this section includes many IT job titles with a short description (not a
full job description by any measure) of the function of that position.
(25) Give a few examples of Job Titles and Job Descriptions in IT in the
following areas (a) Executive Management, (b) Systems Management, (c)
Software Management, (d)Data Management, (e) Network Management, (f)
Security Management, (g) Operations Management, (h) Service Desk.
a) Executive Management: Executive managers are the chief leaders and policymakers
in an organization. They set objectives and work directly with the organization’s most
senior management to help make decisions affecting the future strategy of the
organization.
(i) CIO (Chief Information Officer): This is the title of the top most leaders in
a larger IT organization.
(ii) CTO (Chief Technical Officer): This position is usually responsible for an
organization’s overall technology strategy. Depending upon the purpose of the
organization, this position may be separate from IT.
(iii) CSO (Chief Security Officer): This position is responsible for all aspects of
security, including information security, physical security, and possibly
executive protection (protecting the safety of senior executives).
(iv) CISO (Chief Information Security Officer): This position is responsible for
all aspects of data-related security. This usually includes incident management,
disaster recovery, vulnerability management, and compliance.
(v) CPO (Chief Privacy Officer): This position is responsible for the protection
and use of personal information. This position is found in organizations that
collect and store sensitive information for large numbers of persons.
d) Data Management: Positions in data management are responsible for developing and
implementing database designs and for maintaining databases.
(i) Database Architect: This position develops logical and physical designs of
data models for applications. With sufficient experience, this person may also
design an organization’s overall data architecture.
(ii) Database Administrator (DBA): This position builds and maintains
databases designed by the database architect and those databases that are
included as a part of purchased applications. The DBA monitors databases,
tunes them for performance and efficiency, and troubleshoots problems.
(iii) Database Analyst: This position performs tasks that are junior to the database
administrator, carrying out routine data maintenance and monitoring tasks.
h) Service Desk: Positions at the service desk are responsible for providing front line
support services to IT and IT’s customers.
(i) Help desk Analyst: This position is responsible for providing front line user
support services to personnel in the organization.
(ii) Technical Support Analyst: This position is responsible for providing
technical support services to other IT personnel, and perhaps also to IT
customers.
(2) List some critical control aspects, which are lacking in a computerized
environment
Some of the critical control lacking in a computerized environment are as follows:
(i) Lack of management understanding of IS risks and related controls;
(ii) Absence or inadequate IS control framework;
(iii) Absence of weak general controls and IS controls;
(iv) Lack of awareness and knowledge of IS risks and controls amongst the business
users and even IT staff;
(v) Complexity of implementation of controls in distributed
computing environments and extended enterprises;
(vi) Lack of control features or their implementation in highly technology driven
environments; and
(vii) Inappropriate technology implementations or inadequate security functionality in
technologies implemented.
(3) Explain the meaning of the terms – (a) Control, (b) Control Objectives, in the
context of IT.
(4) What are the different ways in which IT Controls can be classified?
Categories of controls
(8)What are the special precautions to be taken for Protection of IT Systems from
Fire?
Following are the special precautions to be taken for Protection of IT Systems from
Fire: -
Both automatic and manual fire alarms may be placed at strategic locations and a
control panel may be installed to clearly indicate this.
Besides the control panel, master switches may be installed for power and
automatic fire suppression system. Different fire suppression techniques like Dry -
pipe sprinkling systems, water based systems, halon etc., depending upon the
situation may be used.
Manual fire extinguishers can be placed at strategic locations.
Fireproof Walls; Floors and Ceilings surrounding the Computer Room and Fire
Resistant Office Materials such as waste-baskets, curtains, desks, and cabinets
should be used.
Fire exits should be clearly marked. When a fire alarm is activated, a signal may
be sent automatically to permanently manned station.
All staff members should know how to use the system. The procedures to be
followed during an emergency should be properly documented are Fire Alarms,
Extinguishers, Sprinklers, Instructions / Fire Brigade Nos., Smoke detectors, and
Carbon dioxide based fire extinguishers.
Less Wood and plastic should be in computer rooms.
Use a gas based fire suppression system
(9)What are the special precautions to be taken for Protection of IT Systems from
Electric Shock / Spike, etc?
Following are the special precautions to be taken for Protection of IT Systems from
Electric Shock / Spike: -
The risk of damage due to power spikes can be reduced using Electrical Surge
Protectors that are typically built into the Un-interruptible Power System (UPS).
Un-interruptible Power System (UPS)/Generator: In case of a power failure, the
UPS provides the back up by providing electrical power from the battery to the
computer for a certain span of time. Depending on the sophistication of the UPS,
electrical power supply could continue to flow for days or for just a few minutes to
1) Perimeter Fencing: Fencing at the boundary of the facility will enhance the
security mechanism.
2) Video Cameras:
a. Cameras should be placed at specific locations and monitored by security
guards.
b. Refined video cameras can be activated by motion.
c. Video supervision recording must be retained for possible future playback /
evidence purposes.
3) Controlled Visitor Access:
a. Visitors may be Friends, Maintenance Personnel, Computer Vendors,
Consultants & External Auditors.
b. A responsible employee should escort all visitors to the employee whom the
Visitor intends to meet.
4) Controlled Single Entry Point: All incoming personnel should use controlled only
a Single-Entry Point. This controlled entry point should be monitored by a
Receptionist and Security Guards. Multiple entry points increase the chances of
unauthorized entry. Unnecessary or unused entry points should be eliminated or
dead–locked.
5) Security Guards:
a. Extra security can be provided by appointing guards aided with video cameras
and locked doors.
b. Guards supplied by an external agency should be made to sign a bond, in
order to protect the organisation from loss.
6) Dead Man Doors:
a. These consist a pair of doors, that are generally found in entries to facilities
like computer rooms and document stations.
b. The first entry door must close and lock, for the second door to operate, and
only one person will be permitted in the holding area.
c. Only a single person is permitted to enter at a given point of time. This will
reduce the risk of piggybacking, i.e. when an unauthorized person follows an
authorized person through a secured entry.
7) Alarm System:
a. Illegal entry can be avoided by linking an alarm system at places like –
i. inactive entry point motion detectors, and
ii. reverse flows of enter only or exit only doors, so as to avoid illegal entry
/ exit.
(11) What are the various kinds of Locks on Doors, in the context of Physical
Access Control?
Kinds of Locks on Doors
(i) Cipher locks (Combination Door Locks) - Cipher locks are used in low security
situations or when many entrances and exits must be usable all the time. To enter,
a person presses a four-digit number, and the door will unlock for a predetermined
period, usually ten to thirty seconds.
(ii) Bolting Door Locks – A special metal key is used to gain entry when the lock is a
bolting door lock. To avoid illegal entry, the keys should not be duplicated.
(iii) Electronic Door Locks – A magnetic or embedded chip-based plastics card key or
token may be entered a reader to gain access in these systems.
(14) What are the various means of “Controlling Physical Access”, in the
context of Physical Access Control?
(i) Video Cameras: Cameras should be placed at specific locations and monitored by
security guards. Refined video cameras can be activated by motion. The video
supervision recording must be retained for possible future play back.
(ii) Security Guards: Extra security can be provided by appointing guards aided with
CCTV feeds. Guards supplied by an external agency should be made to sign a bond
to protect the organization from loss.
(iii) Controlled Visitor Access: A responsible employee should escort all visitors.
Visitors may be friends, maintenance personnel, computer vendors, consultants and
external auditors.
(iv) Bonded Personnel: All service contract personnel, such as cleaning people and
off-site storage services, should be asked to sign a bond. This may not be a measure
to improve physical security but to a certain extent can limit the financial exposure
of the organization.
(v) Dead Man Doors: These systems encompass a pair of doors that are typically found
in entries to facilities such as computer rooms and document stations. The first
entry door must close and lock, for the second door to operate, with the only one
person permitted in the holding area.
(vi) Non–exposure of Sensitive Facilities: There should be no explicit indication such
as presence of windows of directional signs hinting the presence of facilities such as
computer rooms. Only the general location of the information processing facility
should be identifiable.
(vii) Computer Terminal Locks: These locks ensure that the device to the desk is not
turned on or disengaged by unauthorized persons.
(viii) Controlled Single Entry Point: All incoming personnel can use controlled Single-
Entry Point. A controlled entry point is monitored by a receptionist. Multiple entry
points increase the chances of unauthorized entry. Unnecessary or unused entry
points should be eliminated or deadlocked.
(ix) Alarm System: Illegal entry can be avoided by linking alarm system to inactive
entry point and the reverse flows of enter or exit only doors, to avoid illegal entry.
Security personnel should be able to hear the alarm when activated.
2. Bombs:
a. Meaning: Bomb is a piece of bad code in a program, deliberately planted by
an insider or supplier of a program. Bombs cause a destructive process, e.g.
disruption of computer system, modification of data, destruction of stored
data, etc.
b. Risk: The Bombs explode when the conditions of explosion get fulfilled,
causing the damage immediately.
(21) Explain the Logical Access Control Measures under “Network Access”.
Network Access Control: An Internet connection exposes an organization to the
harmful elements of the outside world. The protection can be achieved through the
following means:
(i) Policy on use of network services: An enterprise wide policy applicable to
internet service requirements aligned with the business need for using the
Internet services is the first step. Selection of appropriate services and approval
to access them should be part of this policy.
(ii) Enforced path: Based on risk assessment, it is necessary to specify the exact
path or route connecting the networks; e.g. internet access by employees will be
routed through a firewall and proxy.
(iii) Segregation of networks: Based on the sensitive information handling
function; say a VPN connection between a branch office and the head- office,
this network is to be isolated from the internet usage service
(iv) Network connection and routing control: The traffic between networks
should be restricted, based on identification of source and authentication access
policies implemented across the enterprise network facility.
(v) Security of network services: The techniques of authentication and
authorization policy should be implemented across the organization’s network.
(vi) Firewall: A Firewall is a system that enforces access control between two
networks. To accomplish this, all traffic between the external network and the
organization’s Intranet must pass through the firewall that will allow only
authorized traffic between the organization and the outside to pass through it.
The firewall must be immune to penetrate from both outside and inside the
organization. In addition to insulating the organization’s network from external
networks, firewalls can be used to insulate portions of the organization’s Intranet
from internal access also.
(vii) Encryption: Encryption is the conversion of data into a secret code for storage
in databases and transmission over networks. The sender uses an encryption
algorithm with a key to convert the original message called the Clear text into
(22) Explain the Logical Access Control Measures under “Operating System
Access”.
Operating System Access Control: Operating System(O/S) is the computer control
program that allows users and their applications to share and access common
computer resources, such as processor, main memory, database and printers. Hence,
protecting operating system access is extremely crucial and can be achieved using
following steps:
(i) Automated terminal identification: This will help to ensure that a specified
session could only be initiated from a certain location or computer terminal.
(ii) Terminal log-in procedures: A log-in procedure is the first line of defense
against unauthorized access as it does not provide unnecessary help or
information, which could be misused by an intruder. When the user initiates the
log-on process by entering user-id and password, the system compares the ID
and password to a database of valid users and accordingly authorizes the log-in.
(iii) Access Token: If the log on attempt is successful, the Operating System creates
an access token that contains key information about the user including user-id,
password, user group and privileges granted to the user. The information in the
access token is used to approve all actions attempted by the user during the
session.
(iv) Access Control List: This list contains information that defines the access
privileges for all valid users of the resource. When a user attempts to access a
resource, the system compasses his or her user-id and privileges contained in
the access token with those contained in the access control list. If there is a
match, the user is granted access.
(v) Discretionary Access Control: The system administrator usually determines;
who is granted access to specific resources and maintains the access control list.
However, in distributed systems, resources may be controlled by the end-user.
Resource owners in this setting may be granted discretionary access control,
which allows them to grant access privileges to other users. For example, the
controller who is owner of the general ledger grants read only privilege to the
budgeting department while accounts payable manager is granted both read and
write permission to the ledger.
(vi) User identification and authentication: The users must be identified and
authenticated in a foolproof manner. Depending on risk assessment, more
stringent methods like Biometric Authentication or Cryptographic means like
Digital Certificates should be employed.
(23) Explain the Logical Access Control Measures under “Application and
Monitoring System Access”.
Application and Monitoring System Access Control: Some steps are as follows:
(i) Information Access restriction: The access to information is prevented by
application specific menu interfaces, which limit access to system function. A user
can access only to those items, s/he is authorized to access. Controls are
implemented on the access rights of users. For example - read, write, delete, and
execute. And ensure that sensitive output is sent only to authorized terminals and
locations.
(ii) Sensitive System isolation: Based on the critical constitution of a system in an
enterprise, it may even be necessary to run the system in an isolated environment.
Monitoring system access and use is a detective control, to check if preventive
controls discussed so far are working. If not, this control will detect and report any
unauthorized activities.
(iii) Event logging: In Computer systems, it is easy and viable to maintain extensive
logs for all types of events. It is necessary to review if logging is enabled and the
logs are archived properly. An intruder may penetrate the system by trying different
passwords and user ID combinations. All incoming and outgoing requests along with
attempted access should be recorded in a transaction log. The log should record the
user ID, the time of the access and the terminal location from where the request has
been originated.
(iv) Monitor System use: Based on the risk assessment, a constant monitoring of some
critical systems is essential. Define the details of types of accesses, operations,
events and alerts that will be monitored. The extent of detail and the frequency of
the review would be based on criticality of operation and risk factors. The log files
are to be reviewed periodically and attention should be given to any gaps in these
logs.
(v) Clock Synchronization: Event logs maintained across an enterprise network plays
a significant role in correlating an event and generating report on it. Hence, the need
for synchronizing clock time across the network as per a standard time is mandatory.
(26) What are the various activities performed under Systems Development
Management Controls?
Systems Development Management has responsibility for the functions concerned
with analysing, designing, building, implementing, and maintaining information
systems. The activities mentioned below deal with system development controls in
IT setup.
(i) System Authorization Activities: All systems must be properly and formally
authorized to ensure their economic justification and feasibility. This requires that
each new system request be submitted in written form by users to systems
professionals who have both the expertise and authority to evaluate and approve (or
reject) the request.
(ii) User Specification Activities: Users must be actively involved in the systems
development process wherein a detailed written descriptive document of the logical
needs of the users is created.
(iii) Technical Design Activities: The technical design activities translate the user
specifications into a set of detailed technical specifications of a system that meets
the user’s needs.
(iv) Internal Auditor’s Participation: The internal auditor should be involved at the
inception of the system development process to make conceptual suggestions
regarding system requirements and controls and should be continued throughout all
phases of the development process and into the maintenance phase.
(v) Program Testing: All program modules must be thoroughly tested before they are
implemented. The results of the tests are then compared against predetermined
results to identify programming and logic errors.
(vi) User Test and Acceptance Procedures: Just before implementation, the individual
modules of the system must be tested as a unified whole. A test team comprising
user personnel, systems professionals, and internal audit personnel subjects the
system to rigorous testing. Once the test team is satisfied that the system meets its
stated requirements, the system is formally accepted by the user department(s).
Phase Controls
Planning Techniques like Work Breakdown Structures (WBS), Gantt charts
and PERT (Program Evaluation and Review Technique) Charts can
be used to monitor progress against plan.
Control The Control phase has two major purposes:
Task progress in various software life-cycle phases should
be monitored against plan and corrective action should be
taken in case of any deviations
Control over software development, acquisition, and
implementation tasks should be exercised to ensure
software
released for production use is authentic, accurate, and
complete.
Design A systematic approach to program design, such as any of the
structured design approaches or object-oriented design is
adopted.
Coding Programmers must choose a module implementation and
integration strategy (like Top-down, Bottom-up & Threads
approach), a coding strategy (that follows percepts of structured
programming), and a documentation strategy (to ensure
program code is easily readable & understandable).
Testing Three types of testing can be undertaken:
Unit Testing – which focuses on individual program
modules;
Integration Testing – Which focuses in groups of
program modules; and
Whole-of-Program Testing – which focuses on whole
program.
These tests are to ensure that a developed or acquired program
achieves its specified requirements.
(28) Outline the scope and significance of Quality Assurance (QA) Management
Controls.
Scope and significance of Quality Assurance (QA) Management Controls: -
(i) Scope: Quality Assurance Management is concerned with ensuring that the –
a. Information Systems produced by the IS Function achieve certain Quality Goals,
and
b. Development, implementation, operation and maintenance of IS, comply with a
set of Quality Standards.
(ii) Importance: The reasons for the emergence of QA in many organizations are as
follows –
a. Organizations are producing many safety–critical systems, where quality is a
important evaluation criteria.
b. Organizations are undertaking more ambitious projects when they build software.
c. Users are becoming more demanding in terms of their expectations about the
quality of software they employ to undertake their work,
d. Organizations are becoming more concerned about their liabilities if they produce
and sell defective software
e. Poor Quality Control over the production, implementation, operation, and
maintenance of software can lead to problems of – missed deadlines, dissatisfied
Users, lower morale among IS Staff, higher maintenance, and abandonment of
many strategic projects.
f. Improving the quality of IS is a part of a worldwide trend among organizations to
improve the quality of the goods and services they sell.
(30) What are the types of Application Controls? Briefly explain their Accounting
and Operations Audit Trail?
Application Controls can be classified into the following categories-
Audit trail controls attempt to ensure that a chronological record of all events that have
occurred in a system is maintained. This record is needed to answer queries, fulfill
statutory requirements, detect the consequences of error and allow system monito ring
and tuning.
The Accounting Audit Trail shows the source and nature of data and processes
that update the database.
The Operations Audit Trail maintains a record of attempted or actual resource
consumption within a system.
(33) Explain the concept of Source Document Controls, in the context of Input
Controls.
Source Document Controls: Frauds with respect to Source Documents include data
entry of fictitious transactions, as well as non–recording of certain transactions.
Some Controls with respect to Source Documents are –
Pre–Numbered Documents: Source Documents should be pre–numbered from the
printer with a unique sequential number on each document. This enables accurate
accounting of document usage and provides an audit trail for tracing transactions
through accounting records.
Sequential Use of Documents: Source Documents should be distributed to the
Users and used in sequence. There should be adequate physical security / restricted
access over the source document inventory at the User site.
Periodical Audit: Missing source documents should be identified by reconciling
document sequence numbers, i.e. Printed less Cancelled less Used = Inventory of
Documents. Documents not accounted for, cancelled but not available for audit, etc.
should be reported to Management.
(34) Explain the concept of Data Coding Controls, in the context of Input
Controls.
Data Coding Controls: Two types of errors - Transcription and Transposition errors
can corrupt a data code and cause processing errors. Any of these errors can cause
serious problems in data processing if they go undetected. These simple errors ca n
severely disrupt operations.
Transcription Errors: It is a special type of data entry error that is commonly made
by human operators or by Optical Character Recognition (OCR) programs. Like
Addition errors (when an extra digit is added to the code); Truncation Errors (when
a digit is removed from the code) and Substitution Errors (replacement of on digit in
a code with another).
Transposition Errors: It is a simple error of data entry that occur when two digits
that are either individual or part of larger sequence of numbers are reversed
(Transpose) when posting a transaction. For example, a sales order for customer
987654 that is transposed into 897654 will be posted to the wrong customer’s
account. A similar error in an inventory item code on a purchase order could result
in ordering unneeded inventory and failing to order inventory that is needed.
(35) Explain the concept of Batch Controls, in the context of Input Controls.
Control Explanation
Error Detection and (a) Processors may malfunction due to design errors,
Correction manufacturing defects, damage, electromagnetic
interference, and ionizing radiation.
(b) Various types of Error Detection and Correction
Strategies must be used.
Multiple Execution (a) Determination of number and nature of the execution
States states enforced by the Processor is very critical for the
auditors.
(b) They help to determine unauthorized activities,
such as gaining access to sensitive data maintained in
memory regions assigned to the operating system or other
user processes, etc.
Timing Controls An Operating System might get stuck in an infinite
loop. In the absence of any control, the program will
not allow the Processor to function and prevent other
programs from performing.
Component Failure of Processor can result in significant losses.
Replication Redundant Processors allow errors to be detected and
corrected. If Processor Failure is permanent in
multicomputer or multiprocessor architectures, the
system might re–configure itself to isolate the failed
processor.
(6) Write short notes on System Control Audit Review File (SCARF)
Technique?
System Control Audit Review File (SCARF) Technique:
SCARF uses embedded audit modules within the host application system to
monitor transaction activity continuously and collect data on transactions of
special audit significance.
The data collected is recorded in a SCARF Master File or Audit Log.
SCARF File records transactions like the following – transactions exceeding a
specified rupee limit, involving inactive accounts, deviating from Company
policy, or containing write–downs of asset values.
The Auditor receives a periodic printout of the SCARF File, examines the
information to identify questionable transactions, and performs necessary
follow–up investigation.
(a) To evaluate how well Quality Assurance (QA) personnel perform their
monitoring role.
(b) To evaluate how well QA Personnel, make recommendations for improved
standards or processes.
(c) To evaluate how well QA Personnel, undertake the reporting function and
training.
Audit Trail Controls: Two types of audit trails that should exist in each
subsystem are as follows:
(11) Explain the Role and Duties of the IS Auditor in the Audit of
Environmental Controls.
Auditing environmental controls requires attention to these and other factors and
activities, including:
(i) Power conditioning: The IS auditor should determine how frequently power
conditioning equipment, such as UPS, line conditioners, surge protectors, or motor
generators, are used, inspected and maintained and if this is performed by qualified
personnel.
(ii) Backup power: The IS auditor should determine if backup power is available via
electric generators or UPS and how frequently they are tested. S/he should examine
maintenance records to see how frequently these components are maintained and
if this is done by qualified personnel.
(iii) Heating, Ventilation, and Air Conditioning (HVAC): The IS auditor should
determine if HVAC systems are providing adequate temperature and humidity levels,
and if they are monitored. Also, the auditor should determine if HVAC systems are
properly maintained and if qualified persons do this.
(iv) Water detection: The IS auditor should determine if any water detectors are used
in rooms where computers are used. He or she should determine how frequently
these are tested and if they are monitored.
(12) Explain the Role and Duties of the IS Auditor in the Audit of Physical
Access Controls.
Role of IS Auditor in Auditing Physical Access Controls: Auditing physical access
requires the auditor to review the physical access risk and controls to form an opinion
on the effectiveness of the physical access controls. This involves the following:
Risk Assessment: The auditor must satisfy him/herself that the risk assessment
procedure adequately covers periodic and timely assessment of all assets, physical
access threats, vulnerabilities of safeguards and exposures there from.
Controls Assessment: The auditor based on the risk profile evaluates whether the
physical access controls are in place and adequate to protect the IS assets against
the risks.
Review of Documents: It requires examination of relevant documentation such as
the security policy and procedures, premises plans, building plans, inventory list and
cabling diagrams.
(13) Explain the Role and Duties of the IS Auditor in the Audit of Logical
Access Controls.
Auditing Logical Access Controls requires attention to several key areas that include
the following:
Network Access Paths: The IS auditor should conduct an independent review of the
IT infrastructure to map out the organization’s logical access paths. This will require
considerable effort and may require the use of investigative and technical tools, as well
as specialized experts on IT network architecture.
Documentation: The IS auditor should request network architecture and access
documentation to compare what was discovered independently against existing
documentation. Similar investigations should take place for each application to
determine all of the documented and undocumented access paths to functions and
data.
Point Description
User User is the Consumer / Buyer, i.e. any Individual / Entity using
the e–Commerce platform / mechanism.
Vendors E–Commerce Vendor refers to the Entity that provides the
required goods and services to the User. Example: Flipkart,
Amazon, etc.
Technology Technology Infrastructure refers to the Computers, Servers,
Database, Mobile Apps, Digital Libraries, Data Interchange, etc.
enabling the e–commerce transactions.
Internet / Faster Net Connectivity contributes significantly to the success of
Network e–Commerce trade of an Entity. Net Connectivity can be through
traditional as well as new technology.
Web Portal Web Portal provides the Application Interface through which
the User interacts with the Vendor to perform the e–
commerce transactions.
Web Portals can be accessed through Desktops / Laptops /
PDA / Mobiles / Smart TVs, etc.
The simplicity and clarity of content on the Web Portal leads
to better customer experience of buying a product online.
Payment Payment Gateway represents the manner through which the
Gateway Customer makes payment to the e– Commerce Vendors.
Payment Gateway is a critical component of e–commerce set–
up, which assures the Seller, of the receipt of money from the
Buyer of goods / services.
Payment Methods include Credit / Debit Card Payments,
Online Bank Payments, Payment Wallet of
Vendor / Third Party, Cash on Delivery (COD), Unified
Payments Interface (UPI), etc.
Computers, Servers • These are the backbone for the success of the
and Database venture. Big e- commerce organization invest
huge amount of money/time in creating these
systems. They store the data / program used to
run the whole operation of the organization.
• As cloud computing is increasingly being used,
many small / mid- sized e-commerce originations
have started using shared infrastructures.
Step Activities
Customers login Few e-commerce merchants may allow same
transactions to be done through phone, but the basic
information flow is e- mode.
Product / Service Customer selects products / services from available
Selection options
Customer Places Order is placed for selected product / service by
Order customer. This step leads to next important activity
PAYMENT GATEWAY.
Payment Gateway Here customer makes a selection of the payment
method. In case payment methods is other than cash
on delivery (COD), the merchant gets the update
from payment gateway about payment realization
from customer. In case of COD, e- commerce vendor
may do an additional check to validate customer.
Dispatch and Shipping This process may be executed at two different ends.
Process First if product / service inventory is managed by e-
commerce vendor, then dispatch shall be initiated at
merchant warehouse.
Second, many e-commerce merchants allow third
party vendors to sale through merchant websites.
For example: FLIPKART states that it has more than
1 lac registered third party vendors on its website.
Delivery Tracking Another key element denoting success of e-
commerce business is timely delivery. Merchants
keep a track of this. All merchants have provided
their delivery staff with hand held devices, where the
product / service delivery to customers are
immediately updated.
COD tracking In case products are sold on COD payment mode,
merchants need to have additional check on
matching delivery with payments.
10.Explain the terms – (1) Network Architecture, and (2) Client Server
Technology.
Network Architecture: Network Architecture refers to the layout of Network, of – (i)
Hardware, (ii) Software, (iii) Connectivity, (iv) Communication Protocols, and (v) Mode
of Transmission. Network Architecture Diagram provides a full picture of the established
network with detailed view of all the resources accessible.
Client Server Technology: Client / Server (C/S) technology refers to computing
technologies in which the hardware and software components (i.e. Clients and Servers)
are distributed through the Network.
11.Explain the terms – (1) Single Tier Architecture, (2) Two Tier Architecture, (3)
Three Tier Architecture.
Single Tier Architecture: A single computer that contains a Database and a front–end
Interface (GUI) to access the Database is known as Single Tier System. All components
required for a Software Application or Technology is put on a Single Server or Platform.
Two Tier Architecture: In a Two–Tier Architecture, the Presentation Layer or Interface
runs on a Client, and the Data Layer or Data Structure is stored on a Server. The User
System Interface is usually located in the User’s desktop environment and the Database
Management Services are kept in the Server which is a more powerful machine that
services many Clients.
Application Tier: This tier is pulled from the Presentation tier. It controls application
functionality by performing detailed processing. This refers to the Application Server
and Back End Server, and includes various Parties – (a) E–Commerce Vendor/Seller, (b)
Reseller, if any, (c) Logistics Partner.
Database Tier: This tier houses the database servers where information is stored and
retrieved. Data in this tier is kept independent of application servers or business logic.
The Data Tier includes the data persistence mechanisms (database servers, file
shares, etc.) and the data access layer that encapsulates the persistence mechanisms
and exposes the data. This covers the Information Storehouse /Database, where all
data relating to Customer Orders, Products, Prices, etc. are stored. This covers the
Information Storehouse /Database, where all data relating to Customer Orders,
Products, Prices, etc. are stored.
(ii) Quality issues: There are quality issues raised by customers as the original
product differs from the one that was ordered.
(iii) Delay in goods and Hidden Costs: When goods are ordered from another
country, there are hidden costs enforced by Companies.
(v) Security and credit card issues: There is cloning possible of credit cards and
debit cards which poses a security threat.
(vi) Infrastructure: There is a greater need of not only digital infrastructure but also
network expansion of roads and railways which remains a substantial challenge in
developing countries.
(vii) Problem of anonymity: There is need to identify and authenticate users in the
virtual global market where anyone can sell to or buy from anyone, anything from
anywhere.
(ix) To ensure System Efficiency, i.e. to optimize the use of various IS Resources
(machine time, peripherals, system software and Labour).
(iv) Network Service Providers: They need to ensure availability and security
of network. Any downtime of network can be disastrous for business.
(v) Technology Service Providers: These include all other service provider
other than network service provider, for example, cloud computing back-
ends, applications back-ends and like. They are also prone to risk of
availability and security.
(vii) Payment Gateways: E-commerce vendors’ business shall run only when
their payment gateways are efficient, effective and foolproof.
16. Each Participant should have policies, practices and procedures in place to
protect from e–commerce / m–commerce related risks. Explain this
statement.
1) Privacy Policies,
2) Information Security Policies,
3) Shipping and Billing Policies,
4) Policies in relation to handling special scenarios, e.g. “Payment Failed”,
Key Cyber Security Risks can be addressed through various Controls, including –
1) Proper definition of a Network Diagram detailing Servers, Databases, Hubs,
Routers, Internal and External.
4) Policy and Procedure Document of the criticality of the Digital Assets, the use of
those digital assets, any direct impact on the Financial Statements of the
company, access restrictions to those assets.
5) Periodical Review of Access Rights to all IT Resources to ensure that the access
to the Users is commensurate with their functional roles and responsibilities.
(ii) Pay or send money from anywhere: With digital payment modes, one can
pay from anywhere anytime.
(iii) Discounts from taxes: Government has announced many discounts to
encourage digital payments. User get 0.75% discounts on fuels and 10%
discount on insurance premiums of government insurers.
(iv) Written record: User often forgets to note down his / her spending, or even
if nothing is done it takes a lot of time. These are automatically recorded in
passbook or inside E-Wallet app. This helps to maintain record, track
spending and budget planning.
(v) Less Risk: Digital payments have less risk if used wisely. If user losses
mobile phone or debit/credit card or Aadhar card, no need to worry a lot.
No one can use anyone else’s money without MPIN, PIN or fingerprint in the
case of Aadhar. It is advised that user should get card blocked, if lost.
(ii) The risk of data theft: There is a big risk of data theft associated with the
digital payment. Hackers can hack the servers of the bank or the E-Wallet
a customer is using and easily get his/her personal information. They can
Overspending
Disputed transactions
2) Network Virtualization:
• Network Virtualization is a method of combining the available resources in a
network by splitting up the available bandwidth into channels, each of which
is independent from the others, and each of which can be assigned (or
reassigned) to a particular server or device in real time.
• This allows a large physical network to be provisioned into multiple smaller
logical networks and conversely allows multiple physical LANs to be combined
into a larger logical network.
• This behavior allows administrators to improve network traffic control,
enterprise and security.
• Network virtualization involves platform virtualization, often combined with
resource virtualization.
3) Storage Virtualization:
6) Reliability:
• High-end conventional computing systems use expensive hardware to
increase reliability.
• The machines also use duplicate processors in such a way that when they
fail, one can be replaced without turning the other off.
• All of this builds a reliable system, but at a great cost, due to the duplication
of expensive components.
Based on their deployment & usage, the Cloud Computing Environments may be
classified as-
(i) Public Clouds: The public cloud is the cloud infrastructure that is provisioned
for open use by the general public. It may be owned, managed, and operated
by a business, academic, or government organizations, or some combination of
them. Typically, public clouds are administrated by third parties or vendors over
the Internet, and the services are offered on pay-per-use basis. These are also
called Provider Clouds.
14.Write short notes on – (a) Public Clouds, (b) Private Clouds, (c) Community
Clouds, and (d) Hybrid Clouds.
1) Public Clouds: The public cloud is the cloud infrastructure that is provisioned for
open use by the general public. It may be owned, managed, and operated by a
business, academic, or government organizations, or some combination of them.
Typically, public clouds are administrated by third parties or vendors over the
Internet, and the services are offered on pay-per-use basis. These are also called
Provider Clouds.
Features:
(i) Scalable, since Public Clouds have higher resources, and Service
Providers ensure that all requests are granted.
(ii) Affordable, since Public Cloud is offered to the public on a pay–as–you–
go basis (e.g. per hour, etc.), and hence, low cost of usage / deployment.
(iii) Less Secure than other deployment Models, since Public Cloud is
offered by a Third Party who have full control over the Cloud.
(iv) Highly Available, i.e. access from any part of the world with proper
permission, without much geographical or other access restrictions.
(v) Stringent SLAs, since the Service Provider’s business reputation and
customer strength are largely dependent on the Cloud Services, SLAs
are followed strictly and violations are avoided.
2) Private Clouds: This cloud computing environment resides within the boundaries
of an organization and is used exclusively for the organization’s benefits. These
are also called Internal Clouds or Corporate Clouds. Private Clouds can either be
Features:
(i) More Secure since the Private Cloud is deployed and managed by the
Entity itself, and lower chance of data leakage.
(ii) Better Control, since the Entity need not rely on anybody else for control
of the Private Cloud.
(iii) Weak SLAs, since in a Private Cloud, Formal SLAs do not exist or are
weak as it is between the Entity and User of the same Entity.
Features:
(i) Collaborative & Distributive: No single Company has full control over
the whole cloud. This is usually distributive and hence better co–
operation provides better results.
(ii) Partially Secure: Only a few organizations share the Cloud, so there
is a possibility that the data can be leaked from one organization to
another, however it is safe from the external world.
(iii) Cost Effective: Community Cloud becomes cost effective since it is
shared by many organizations.
Features:
(i) Scalable: Hybrid Cloud with the help of its Public Cloud counterpart is
also scalable.
(ii) Partially Secure: The Private Cloud is considered as secured and Public
Cloud has high risk of security breach. The Hybrid Cloud is thus partially
secure.
(iii) Stringent SLAs: SLAs are more stringent than the Private Cloud, and
might be on the lines provided by the Public Cloud Service Providers.
Instance Description
Instance Description
Network as a • Provides users with needed data communication capacity to
Service (NaaS) accommodate bursts in data traffic during data-intensive activities
such as video conferencing or large file downloads.
• It is an ability given to the end-users to access virtual network
services that
are provided by the service provider over the Internet on a per-
per-use basis.
• Allows network architects to create virtual networks; virtual
network interface cards (NICs), virtual routers, virtual switches,
and other networking components.
• Allows the network architect to deploy custom routing protocols
and enables the design of efficient in-network services, such as
data aggregation, stream processing, and caching. NaaS
providers operate using three common service models: Virtual
Private Network (VPN), Bandwidth on Demand (BoD) and Mobile
Virtual Network (MVN).
Storage as a • Provides storage infrastructure on a subscription basis to users
Service (STaaS) who want a low-cost and convenient way to store data,
synchronize data across multiple devices, manage off-site
backups, mitigate risks of disaster recovery, and preserve
records for the long-term.
• It is an ability given to the end users to store the data on the
storage services
provided by the service provider.
Instance Description
Communicatio • It is an outsourced enterprise communication solution that
n as a Service can be leased from a single vender. The CaaS vendor is
(CaaS) responsible for all hardware and software management and
offers guaranteed Quality of Service (QoS). It allows
businesses to selectively deploy communication devices and
modes on a pay-as-you-go, as-needed basis.
• This approach eliminates the large capital investments.
Examples are: Voice over IP (VolP), Instant Messaging (IM),
Collaboration and Videoconferencing application using fixed
and mobile devices.
Data as a • Provides data on demand to a diverse set of users, systems
Service or application. The data may include text, images, sounds,
(DaaS) and videos.
• Data encryption and operating system authentication are
commonly provided for security. DaaS users have access to
high-quality data in a centralized place and pay by volume
or data type, as needed.
• However, as the data is owned by the providers, users can
only perform read operations on the data. DaaS is highly
used in geography data services and financial data services.
Security • It is an ability given to the end user to access the security
as a service provided by the service provider on a pay-per-use
Service basis.
(SECaaS)
• It is a new approach to security in which cloud security is
moved into the cloud itself whereby cloud service users will
be protected from within the cloud using a unified approach
to threats.
Identity as a • It is an ability given to the end users; typically, an
Service organization or enterprise; to access the authentication
(IDaaS) infrastructure that is built, hosted, managed and provided
by the third-party service provider.
• Generally, IDaaS includes directory services, authentication
services, risk and event monitoring, single sign-on services,
and identity and profile management.
Mobile Communication:
• This refers to the infrastructure put in place to ensure that seamless and
reliable communication goes on.
• This would include communication properties, protocols, data formats and
concrete technologies.
Mobile Hardware:
• This refers to the various Mobile Devices or Device Components that
receive or access the service of mobility.
• It includes Portable Laptops, Smart Phones, Tablet PCs, and Personal
Digital Assistants (PDA) that use an existing and established network to
operate on.
• At the back end, there are various servers like Application Servers,
Database Servers and Servers with wireless support, WAP gateway, a
Communications Server and/or MCSS (Mobile Communications Server
Switch) or a wireless gateway embedded in wireless carrier’s network.
24. Write short notes on the concept of Green Computing or Green IT.
• Green Computing or Green IT refers to the study and practice of
environmentally sustainable computing or IT.
• In other words, it is the study and practice of establishing/ using computers
and IT resources in a more efficient and environmentally friendly and
responsible way.
• The objective of Green computing is to reduce the use of hazardous materials,
maximize energy efficiency during the product’s lifetime, and promote the
recyclability or biodegradability of defunct products and factory waste.
• Such practices include the implementation of energy-efficient Central Processing
Units (CPUs), servers and peripherals as well as reduced resource consumption
and proper disposal of electronic waste (e-waste).
27. Write short notes on the “Bring Your Own Device” (BYOD)
Concept.
• BYOD (Bring Your Own Device) refers to business policy that allows employees
to use their preferred computing devices, like smart phones and laptops for
business purposes.
• It means employees are welcome to use personal devices to connect to the
corporate network to access information and application.
• The BYOD policy has rendered the workspaces flexible, empowering employees
to be mobile and giving them the right to work beyond their required hours.
• Though it has led to an increase in employees’ satisfaction but also reduced IT
desktop costs for organizations as employees are willing to buy, maintain and
update devices in return for a one-time investment cost to be paid by the
organization.
(d) Collections,
(i) Customers can deposit instruments like Cheques, Drafts, Pay Orders, Travelers
Cheques, Dividend and Interest Warrants, Tax Refund Orders, etc. drawn in their
favour and Trade Bills drawn by them on their Buyers with their Bank for
collection.
(ii) Banks collect the proceeds of these instruments, on behalf of the customer.
(iii) Collection Services are also extended for Term Deposit Receipts, instruments
issued by Post Offices, e.g. National Savings Certificates, Postal Orders, etc.
(e) Clearing,
(i) Clearing, i.e. collecting instruments on behalf of Customers, is done through
Clearing House Mechanism.
(ii) A Clearing House settles the inter–Bank transactions among the local participating
Member Banks and Post Offices.
(iii) Clearing Houses generally adopt the electronic means, viz. MICR (Magnetic Ink
Character Recognition) Code for its operations.
(iv) MICR Code is a 9–digit code comprising relevant information about the
transaction and the Bank. MICR technology allows machines to read and process
cheques, and complete voluminous transactions within a short time.
(v) Using Core Banking System (CBS), Banks/Branches, honour and pay instruments
of other Branches beyond their Clearing Zone payable at par by the designated
Branch of that Centre.
(f) Remittances,
(i) Remittances involve transfer of funds from one place to another.
(ii) Remittances are handled by Banks through – (a) Demand Draft (DD) / Bankers’
Cheque / Pay Orders, (b) Telegraphic / Mail Transfers (TT/MT), (c) Electronic
Funds Transfer (NEFT / RTGS transfer).
Meaning These are controls which These are controls which are
pervade across different layers implemented in an application, to
of IT Environment and IT prevent or detect and correct
Systems. errors.
Scope Their impact is macro in nature, They pertain to the scope of
i.e. at different levels of IT individual business processes or
Environment. application systems (i.e. micro–
impact.)
Purpose 1) To meet overall objectives of 1) To ensure accurate and reliable
the IT System, processing,
6. All key modules of banking are all connected and related transactions are interfaces
with central server. Explain.
All key modules of banking are all connected and related transactions are interfaces with
central server are explained below:
1) Back Office: The Back Office is the portion of a company made up of administration and
support personnel, who are not client-facing. Back- office functions include settlements,
clearances, record maintenance, regulatory compliance, accounting, and IT services.
Back Office professionals may also work in areas like monitoring employees'
conversations and making sure they are not trading forbidden securities on their own
accounts.
3) Credit-Card System: Credit card system provides customer management, credit card
management, account management, customer information management and general
ledger functions; provides the online transaction authorization and service of the bank
card in each transaction channel of the issuing bank; Support in the payment application;
and at the same time, the system has a flexible parameter system, complex organization
support mechanism and product factory-based design concept to speed up product time
to market.
5) Central Server: Initially, it used to take at least a day for a transaction to get reflected in
the real account because each branch had their local servers, and the data from the server
in each branch was sent in a batch to the servers in the data centre only at the end of the
day (EOD). All the bank's branches access applications from centralized data
6) Branch Banking: CBS are the bank’s centralized systems that are responsible for
ensuring seamless workflow by automating the frontend and backend processes within
a bank. CBS enables single-view of customer data across all branches in a bank and thus
facilitate information across the delivery channels.
11. CBS is based on Client–Server Architecture. Explain the Role of Client, Server and
Branches in this regard.
Role of Client:
➢ User may be a Customer, or Staff at a Branch / Office.
➢ User–Actions and Controls are predominantly menu–driven.
➢ User is prompted by the Software to initiate an activity or to apply a control.
➢ User’s actions are validated by the CBS, and the transaction is permitted / allowed
accordingly.
➢ All operations that a Customer may do at any of the Branches of the Bank, are
validated at those Branches. However, the accounting process is centralized at the
Central Data Centre, and is updated at the Centralized Database.
Role of Server:
➢ Update of Database immediately when transactions are input and validated /
authorised,
➢ Updating of parameters globally,
➢ System–generated Transactions, e.g. Application of Interest and Service Charges,
Standing Instructions, Transfers, etc.
➢ Balancing/Reconciliation of Ledgers,
➢ Triggering and Generation of various kinds of Reports, etc.
Role of Branches:
➢ Beginning–Of–Day (BOD) Operations,
➢ Managing manual documents/vouchers, capturing data required for input into the
software,
➢ Internal Authorization,
➢ End–Of–Day (EOD) Operations,
➢ Reviewing Reports for control and error correction.
13. Explain the various key aspects in-built into the architecture of the Core Banking
System.
Some key aspects in-built into architecture of a CBS are as follows:
1) Information flow: This facilitates information flow within the bank and improves the
speed and accuracy of decision-making. It deploys systems that streamline integration
and unite corporate information to create a comprehensive analytical infrastructure.
2) Customer centric: Through a holistic core banking architecture, this enables banks
to target customers with the right offers at the right time with the right channel to
increase profitability.
3) Regulatory compliance: This holds the compliance in case bank is complex and
expensive. CBS has built-in and regularly updated regulatory platform which will
ensure compliance.
4) Resource optimization: This optimizes utilization of information and resources of
banks and lowers costs through improved asset reusability, faster turnaround times,
faster processing and increased accuracy.
14. Prepare a list of risks associated with Data Centre and Network Operations of Core
Banking System.
Risks associated in respect of Data Centre and Network Operations of Core Banking System
are:
➢ The transactions may not be recorded completely or accurately, and the related items
will be inaccurately or incompletely recorded.
➢ Invalid items may be recorded or valid items may be inaccurately or incompletely
recorded.
➢ Timely and adequate technical support may not be available and issues may not be
resolved.
➢ User queries may not be timely and adequately resolved.
➢ Timely execution and complete processing and availability of data may not be ensured.
15. Write short notes on the following Servers in a CBS IT Environment – (a) Application
Server, (b) Internet Banking Application Server (c) ATM Channel Server, (d) Internet
Banking Channel Server, (e) Database server, (f) Web Server, (g) Proxy Server, (h)
Anti–Virus Software Server.
16. Application Software in a CBS Environment have 4 Gateways. Briefly explain them.
Application Software have 4Gatewaysthrough which the Bank / Entity can control the
functioning, access and use the various menus and functions of the software –
1) Configuration:
➢ Configuration refers to the manner in which a Software is set–up for use.
➢ Configuration is thus the first step after Software Installation, and is a very significant step.
➢ It includes both Hardware and Software Parameters.
➢ Configuration will define how the Software will function and what menu options are
displayed.
➢ CBS Configuration involves defining the various parameters as per the Bank’s Policies,
Practices, Procedures and Business Process Rules.
➢ CBS Configuration includes –
• modifying the default parameters in Systems Software,
• defining the workflow for each of the Products or Services,
• setting up of different CBS Modules e.g. Advances, Deposits, Cash, Treasury, etc.
• defining the Access Rules, User Creation, Rights, Password Procedures, etc.
• specifying the manner of system–driven transactions, e.g. Interest Computation.
2) Masters:
➢ Masters refer to the setting parameters for various types of Product and Service Types as
per the Software Modules used in the Bank.
➢ The Parameter Settings in the Masters will determine how the Software will process
relevant transactions.
➢ After configuring the software, the Masters are set–up first time during installation.
➢ Masters are also called Standing Data, since they are changed only when – (i) there are
changes in Business Processes, Values, etc. and (ii) they are authorised by appropriate levels
of Management.
➢ Some examples of masters in context of CBS Software are as follows:
• Customer Master: Customer type, details, address, PAN details,
• Employee Master: Employee Name, Id, designation, level, joining details, salary, leave,
etc.
• Income Tax Master: Tax rates applicable, Slabs, frequency of TDS, etc.
3) Transactions:
➢ In CBS, Transactions refer to the actual transactions of various Products and Services.
➢ Some examples of transactions in the context of CBS software are given here:
4) Reports:
➢ Information processed by the System is provided to Users through Reports.
➢ These reports could be used for monitoring the operations as also for tracking the
performance or security.
➢ Some examples of reports are as follows:
• Summary of transactions of day
• Daily General Ledger (GL) of day
• Activity Logging and reviewing
• MIS report for each product or service
• Reports covering performance/compliance;
• Reports of exceptions, etc.
18. Explain the Business Process Flow of CASA Facility. Outline its Risks and related
Controls.
Process flow of CASA facility:
a. Customer request: Customer – (a) approaches the Relationship Manager (RM) to
apply for a CASA facility, or (b)applies for CASA facility through Internet Banking.
b. Application: Customer submits relevant documents, viz. Application, KYC
Documents (PAN, Aadhaar, Driving License, Passport, etc.), either in physical self–
attested or electronic form (e–KYC).
c. Initial screening: After initial screening for completeness, the RM forwards the
documents to the Credit Team.
d. Assessment: The Credit Team – (a) verifies the documents, (b) assesses the
financial and credit–worthiness of the Applicant Customer, and (c) updates the
appropriate facilities in the Customer Account.
e. Facilities: CASA along with the requested facilities are provided to the Customer
for daily operations. Facilities include Cheque Deposits / Withdrawal, Cash Deposit
/ Withdrawal, RTGS, NEFT, ECS, SMS Alerts, Internet Banking, etc.
Risks & controls in CASA process:
Risk Key controls
Customer Master defined in • Input Controls should be in place to check
CBS is not as per the accuracy of data by comparing with Source
Application / KYC Documents, immediately after its entry.
• Access Rights to authorize the Customer Master in
CBS should be restricted to Authorized Personnel.
Inaccurate Interest / Charges • Interest Allowed on Savings Account balances
is calculated in CBS. should be automatically computed in CBS as per
the defined rules.
• Charges for facilities, e.g. RTGS/NEFT, etc. should
be automatically computed in CBS as per the
defined rules.
Unauthorized Personnel SoD to be maintained between the Initiator (Maker)
approve the CASA transaction and Authorizer (Checker) of the transaction for
in CBS. processing in CBS.
Inaccurate accounting entries Accounting Entries should be generated by CBS
are generated in CBS based on the facilities requested by the Customer,
and defined configurations for those facilities in CBS.
19. Explain the Business Process Flow of Credit Cards. Outline its Risks and related
Controls.
Process Flow of Issuance of Credit Card Facility:
20. Explain the Business Process Flow of Mortgage Loans. Outline its Risks and related
Controls?
Business process flow of mortgage loan:
a. Customer request: Customer approaches the Relationship Manager (RM) or Loan
Officer (LO) to apply for a Mortgage Loan.
b. Discussion: The RM/LO provides Loan Consulting to the Customer / Borrower, on
various procedural and financial aspects of the Loan .
c. Application: Customer submits Loan Application, KYC Documents, Income Proof,
details as to Existing Loans and Financial Obligations, Property proposed to be
purchased, etc.
d. Initial screening: After initial screening and review of the Application and
Documents, the RM/LO forwards the Application and Documents to the Credit
Team.
e. Credit assessment: The Credit Risk Team evaluates various factors like – (i)
Present and Proposed Incomes, (ii)Existing Loan Obligations, (iii) Past Credit
History of the Applicant in terms of CIBIL Score, (iv) Ratios of Proposed EMIs to Net
Disposable Income, (v) Number of Dependents, etc.
f. Under writing team: The Underwriting Team –(1) verifies the Applicant’s Credit
History and current employment information, (2) ensures that the Loan to be
provided is within the lending guidelines, (3) provides a Conditional Approval,
along with the list of documents to be obtained.
22. Explain the Business Process Flow of Treasury Operations. Outline its Risks and
related Controls.
Business process flow of treasury operations:
a. Pre-Deal Analytics: Before entering into a Deal (for purchase or sale), Dealers check
various aspects including – (a) Requirements of the Bank, (b) Risk levels undertaken,
(c) Counter–Party and Own Credit Limits, (d) Regulatory Compliance, e.g. Forex
Deals, Board Resolution, International Swaps and Derivatives Association (ISDA)
Agreement, Margin Requirements, etc.
b. Entering into trade deals: Dealers use the appropriate Trading /Communication
Platform, e.g. Reuters’ System, Telephonic Conversation, Brokers or another Private
Channel, with the respective Counter–Party. All transactions in a Treasury Function
are recorded through a system that tracks the flow of each transaction through its life
cycle. The document that records the transaction is called a Deal Ticket.
c. Ticket entry: As soon as the deal is struck with the Counter–Party, the Deal Ticket is
recorded in the Front Office System, and gets queued in for authorization.
d. FO approval: After the Deal Ticket has been created and recorded, it is approved by
another User in the Front Office. Each User is assigned a financial limit, to approve
Ticket Amounts within that limit.
e. Middle office process: If Deal Ticket details are found correct, the Deal Ticket as
approved by FO, flows into the Treasury System. Middle Office now performs Pricing
and Valuations on the Deal Ticket.
24. Write short notes on e–Commerce Transaction Processing – i.e. Payment Process
through Gateway.
➢ Here, the User logs in on the e–commerce Website Portal, places an order and selects
the option of payment, e.g. through Cards, or through Internet Banking.
➢ For Payment through Internet Banking, the Merchant Site is directed to Bank’s
Merchant–Internet Banking Server.
➢ User must log in in the Bank’s Server and authorize payment, through OTP (Online
Transaction Password) received on the Registered Mobile, to complete the transaction.
➢ After this, the Customer is re–directed from the Bank’s Site to Merchant’s Site.
26. What is the sub–processes of “Information Security”? List a few risks and related
controls?
In a CBS, “Information Security” includes the following sub– processes:
(a) Policies, Procedures, and Practices: This refers to the processes relating to approval
and implementation of Information Security. These cover all key areas of securing
information at various layers of information processing.
(b) User Security Administration: This refers to security for various Users of IT Systems,
and covers how Users are created and granted access as per the Bank’s Organization
Structure and Access Matrix. User Security Administration ranges from creation to
disabling of Users.
(c) Application Security: This refers to how security is implemented at various aspects of
application. It covers configuration, setting of parameters and security for transactions
through various Application Controls.
(d) Database Security: This refers to various aspects of implementing security for the
Database Software.
(e) Operating System Security: This refers to the security for Operating System Software
which is installed in the Servers, and the Systems which are connected to the Servers.
(f) Network Security: This refers to security at various layers of Network and
Connectivity to the Servers.
(g) Physical Security: This refers to security implemented through Physical Access
Controls.
Risks and related Controls relating to Information Security are as under –
Risks Key IT control
1) Significant information Super user access or administrator passwords are
resources may be modified changed on system, installation and are available
inappropriately, disclosed with administrator only. Password of super use or
without authorization, administrator is adequately protected.
and/or unavailable when
needed.
2) Lack of management Security policies are established and management
direction and commitment monitors compliance with policies.
to protect information
assets.
29. Briefly describe the provisions of the Prevention of Money Laundering Act, in the
context of Banks?
➢ Money–Laundering has the meaning assigned u/s 3 which provides as–
Whosoever directly or indirectly attempts to indulge or knowingly assists or
knowingly is a party or is actually involved in, any process or activity connected with
the proceeds of crime including its concealment, possession, acquisition or use and
projecting or claiming it as untainted property, shall be guilty of offence of Money–
Laundering.
➢ Punishment will give under section 4 as follow- Whoever commits the offence of
Money–Laundering shall be punishable with Rigorous imprisonment for a Minimum
3 years, Maximum 7 years and Fine.
30. Briefly describe the impact of Cybercrimes, in the context of Banks.
Cybercrime or Computer Crime involves use of a Computer and a Network. Cybercrimes are
offences that are committed against Individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental harm,
or loss, to the victim directly or indirectly, using modern Telecommunication Networks like
Internet (Chatrooms, email, Notice Boards and Groups) and Mobile Phones.
31. Write short notes on Sensitive Personal Data or Information, in the context of Banks.
Personal Information means any information that relates to a Natural Person, which, either
directly or indirectly, in combination with other information available or likely to be available
with a Body Corporate, is capable of identifying such person.
Sensitive Personal Data or Information (SPDI) of a Person means such Personal Information
which consists of information relating to –
(a) Password,
(b) Financial Information such as Bank Account or Credit Card or Debit Card or other
payment instrument details,
(c) Physical, Physiological and Mental Health Condition,
(d) Sexual Orientation,
(e) Medical Records and History,
(f) Biometric Information,
(g) Any detail relating to the above Clauses as provided to Body Corporate for providing
service, and
(h) Any of the information received under above Clauses by Body Corporate for processing,
stored or processed under lawful contract or otherwise.
Duties of Banks:
35. Write short notes on various damages to Computer System or Network u/s 43.
If any person without permission of the owner or any other person who is in- charge of a
computer, computer system or computer network -
a) accesses or secures access to such computer, computer system or computer network;
b) downloads, copies or extracts any data, computer database or information from such
computer, computer system or computer network including information or data held
or stored in any removable storage medium;
c) introduces or causes to be introduced any computer contaminant or computer virus
into any computer, computer system or computer network;
d) damages or causes to be damaged any computer, computer system or computer
network, data, computer database or any other programmes residing in such computer,
computer system or computer network;
e) disrupts or causes disruption of any computer, computer system or computer network;
f) denies or causes the denial of access to any person authorized to access any computer,
computer system or computer network by any means;
36. Write short notes on Penalties & Adjudications under Chapter X of Information
Technology Act.
Section 63. Punishment for false information or failure to give information, etc.
➢ Any person wilfully and maliciously giving false information and so causing an arrest or
a search to be made under this Act shall on conviction be liable for imprisonment for a
term which may extend to two years or with fine which may extend to fifty thousand
rupees or both.
➢ If any person -
a. being legally bound to state the truth of any matter relating to an offence under
section 3, refuses to answer any question put to him by an authority in the exercise
of its powers under this Act; or
b. refuses to sign any statement made by him in the course of any proceedings under
this Act, which an authority may legally require to sign; or
37. Describe the ‘Tampering with Computer Source Documents’ u/s 65 of Information
Technology Act 2000?
Offence:
➢ Knowingly or intentionally concealing, destroying or altering, or causes to conceal,
destroy or alter any computer source code. Computer Source Code means the listing of
programmes, computer commands, design & layout & programme analysis of computer
resource in any form.
Penalty:
➢ Imprisonment up to 3 years, or
➢ Fine up to ₹2,00,000, or
➢ Both.
38. Briefly explain the following with respect to the Information Technology Act 2000:
[Section 66B] Punishment for dishonestly receiving stolen Computer Resource or
Communication Device:
Offence:
➢ Dishonestly receiving or retaining any stolen Computer Resource or Communication
Device knowing or having reason to believe the same to be stolen Computer Resource or
Communication Device.
Penalty:
➢ Imprisonment up to three years, or