Concise Notes by Shahrukh - MIS
Concise Notes by Shahrukh - MIS
Naqvi) and read their slides, CISA review manual, ICMA study text, different notes written by
students and also read every term and topic from the internet. Keeping in mind the past papers
and paper pattern of the subject, I have tried to gather all the content in one place in a
comprehensive manner. Hope these notes will be very useful for the upcoming students.
SHAHRUKH AHMAD
E-business: conducting key business processes through the extensive use of internet technologies
Examples: Careem, Uber, FoodPanda
Advantages of E-business:
• Cheaper to run
• Better information for control
• No geographical boundaries/ globalization
• Quick and easy communication
• Provide better services
• Simplifies business processes
• Encourages innovation
Advantages of E-commerce:
• 24/7 open
• Reach more customers
• Cost is lower for both sides
• Able to process a high number of orders
• Fast response to market demands
• No geographical boundaries
• Quick and easy communication
Other types:
4. Business to Government (B2G)
5. Consumer to Business (C2B)
6. Government to Citizen (G2C)
Disadvantages of B2B:
• Greater competition
• No face-to-face contact
• Unknown suppliers
• Heavily technology driven
• High premium on standardization
• Security risks
• Transaction errors or fraud risks
Disadvantages of C2C:
• Product quality may be suffered
• Shown and received things can be different
• Fake communications can be created
• Transaction errors or frauds may occur
E-commerce Architecture
It is based on the ‘Client-server architecture’.
Client is a software, such as browser, which sends a request to a server for certain services.
Server is the provider of the services, requested by the client.
*Tier = Layer
Two-tier architecture
In two-tier architecture, the user interface runs on the client and the database exists on the server
The business application logic can either run on the client or the server
Two layers of this server are ‘data layer’ and ‘presentation layer’
Three-tier architecture
This architecture consists of three layers: data layer, application layer and presentation layer
The application logic lives in the middle tier (application server) and provides process management services
N-tier architecture refers to the structure of a software application divided into multiple tiers.
EDI software translates user friendly data into the X12 standard format for transmission. When an EDI
message is received, the software translates the coded message into the receiver’s user friendly format.
EDI Layered Architecture
EDI architecture consists of four Layers:
Semantic layer
Describes the business application that is driving EDI
Transport layer
Defines the type of communication service or protocol to be used such as E-mail, Point-to-Point or WWW
Physical layer
Defines the data transmission path for EDI transaction such as Dial-up lines, Internet or WANs
Benefits of EDI:
• Reduced paper work
• Better communication
• Accurate and improved billing
• Lower operating costs
• Improve business cycle speed
• Reduce human error
• Improve record accuracy
• Increase business efficiency
• Enhance transaction security
• Increase satisfaction of both parties
• Receive information in real time
Drawbacks of EDI:
• Initial setup is time consuming
• Limits your trading partners
• EDI standards change continuously
• Too many standards to uphold
• Keep proper suitable backup system
• Very high initial costs
E-payment Modes
Credit card: allows customers to borrow funds from bank within a pre-set credit limit
Debit card: deducts money directly from your bank account
Smart card: has an embedded chip that stores information, used to perform financial transactions
Prepaid card: a separate reloadable card that is not linked to the bank account
Digital Wallet, E-wallet or E-purse: an electronic device or online service that allows one party to make
electronic transactions with another party using digital currency units
Digital card, Virtual card or Cloud card: a digital version of your bank card that is available online and
don't have a physical form
Electronic funds transfer (EFT): a digital movement of money from one bank account to another rather
than through a physical paper check
1. Merchant
2. Customer
3. Issuing bank
4. Acquirer/ Card network
5. Payment processor
6. Payment gateway
Cryptocurrency
Digital currency or Cryptocurrency is any form of currency that exists digitally or virtually and uses
cryptography to secure transactions, e.g. Bitcoin, Ethereum, Ripple, Polygon, Tether, etc.
Blockchain
When we say the word ‘Blockchain’ in this context, we are actually talking about the digital information (the
block) stored in a public database (the chain).
Blockchain is a technological structure behind the Bitcoin network that stores public transactional records
in several databases in a network, connected through peer-to-peer nodes.
It is a distributed, decentralized digital public ledger.
Every transaction in this ledger is authorized by the digital signature of the owner.
These ledgers cannot be altered, deleted, edited or destroyed.
Blockchain increases trust, speed, security, transparency, visibility and traceability of data, shared across a
business network.
Limitations of Cryptocurrency:
• Extremely volatile in nature
• Vulnerable to hacks
• Buying NFTs with other tokens
• High consumption of energy for mining
• Difficult to understand due to complex technology
• No protection in case of data loss
• No reverse of payment and recovery
• Illegal transactions/ Black market
• Scalability and cybersecurity issues
• Has no physical form or intrinsic value
E-marketing
E-marketing, Digital marketing or Internet marketing refers to promote products and services by using the
Internet and online based digital technologies to reach the target audience.
Advantages of E-marketing:
• Saving overhead costs through the use of electronic media
• Faster response to both marketers and the customers
• Offers instant feedback
• Measurable and trackable results
• Quick branding on a bigger scale
• Enables personalization and accurate targeting
• Effective global reaching
Disadvantages of E-marketing:
• Heavily reliance on technology
• Cyber security and privacy issues
• Requires digital skills
• Likelihood of your promotional strategies being copied
Supply Chain Management is the handling of the entire flow of goods includes the movement and storage
of raw materials, work-in-process inventory and finished goods from point-of-origin to the point-of-sale.
It helps a company get the right product to the right place at the right time, in the proper quantity at an
acceptable cost.
SCM Considerations:
Purchasing and procurement strategies
Materials management optimization
Inventory levels
Warehouse facility location
Transport costs
Vehicle scheduling
Sales forecasting
Warehouse management systems
Stock control systems
Benefits of SCM:
• Better collaboration and relations with suppliers
• Shipping optimization
• Reduced inventory and overhead costs
• Improved risk mitigation
• Stronger cash flow
• A more agile business
• Better visibility and data analytics
• Consistent quality assurance
• Customer satisfaction
• Increased productivity
• Shorter lead times
project initiation
evaluation of current processes
business practices
project organization
2. Design and Customization Phase
Tasks covered in this phase are:
train users
executing trial production
maintain systems
reconciliation reports
Advantages of ERP:
• Cost savings
• Improves reporting and planning
• More flexible modularity/ scalability
• Expands collaboration and workflows
• Standardizes and improves business processes
• Higher management performance
• Better accuracy and availability of information
• Improved customer service
• Better competitiveness in market
• Simplified and streamlined operations
• Improves lines of communication
• Reduced potential business risks
• Integrates all departments
• Encourages innovation
• Fast-track adoption of new technology
Disadvantages of ERP:
• Expensive to start
• Complex data conversion
• Slow implementation
• Require maintenance and upgradations
• Time consuming customization
• Requires thorough training to use
A CRM software helps an enterprise to learn more about the customer's needs and makes any knowledge
gained through interaction with the customer accessible at all levels of the organization.
It enables a business and its employees to deliver fast, convenient, dependable and consistent service to its
customers.
Benefits of CRM:
• Better customer service
• Increase marketing opportunities
• Increase sales and profitability
• Better segmentation
• More accurate sales forecasting
• Perform detailed analytics
• Facilitates discovery of new customers
• Builds stronger relationships with potential customers
Steps in BPR:
1. Analyze organization structure and processes
2. Put together a team of experts
3. Find problems and gaps
4. Identify and analyze improvement opportunities
5. Define objectives and framework
6. Redesign the process
7. Implement changes and monitor the results
Benefits of BPR:
• Cost reduction
• Identify strengths, weaknesses, opportunities and threats of the business (SWAT)
• Expands collaboration and workflows
• Standardizes and improves business processes
• Higher management performance
• Improved customer service
• Enhancement of productivity
• Building a strategic view of operational procedures
• Better competitiveness in the market
• Simplified and streamlined operations
• Reduced potential business risks
• Improves lines of communication
• Encourages innovation
• Adoption of new technology
Examples:
Google Assistant
Google Translate
Manufacturing robots
Facial recognition systems
Examples:
Siri by Apple
Watson by IBM
Alexa by Amazon
Rankbrain by Google
Cortana by Microsoft
One example of the artificial superintelligence system is Skynet from the Terminator film.
Advantages of AI:
• Improved workflows
• Deeper and faster data analysis
• Fast, smart, unbiased and more informed decision making
• 24/7 availability
• Reduction in human error
• Helping in repetitive jobs
• Automation
• Increased business efficiency
• Provides precision and perfection
• Increase in productivity and quality
Disadvantages of AI:
• Risk of unemployment
• Increasing human's laziness
• Lack of creativity
• Absence of emotional range
• Inability to incorporate ethics
Altcoin: any alternative digital currency to Bitcoin, e.g. Litecoin, Ethereum, Ripple, NEO
ANSI X12: protocol for Electronic data interchange (EDI) from American National Standards Institute (ANSI)
Barter system: exchange of goods and services for other goods and services without exchanging any form of
money
Bricks and Clicks: a business model used by merchants to operate both an online store and a physical retail
outlet, e.g. Walmart, Target
Business infrastructure: the basic facilities, structures and operations upon which the rest of a business is
built
Business process: a repeatable standardized method or set of activities that a company uses to reach a
specific target
Business risks: the threats that may negatively impact on assets, processes or objectives of an organization
Chat rooms: online platforms that enable users to communicate with each other in real time on the internet
where they can exchange messages about a particular subject, e.g. Skype, Google Meet, Google Chat
Content aggregators: the websites that collect content from other websites around the Internet and
aggregate it into one easy-to-find location
Cryptography: a method of protecting information and communications through the use of codes so that
only those for whom the information is intended can read and processes it
E-auction: a transaction between auctioneers (sellers) and bidders (buyers) that takes place on an electronic
marketplace
Electronic marketplace: a type of e-commerce website where a product or service is provided by multiple
third parties, e.g. Amazon, eBay, Craigslist
Economies of Scale: the cost advantage experienced by a firm when it increases its level of output
Enterprise application integration (EAI): an integration framework, collection of technologies and
services which form a middleware to enable integration of systems and applications across an enterprise
Five key resources of a Business: Financial, Physical, Intellectual, Personnel and Digital resources
Franchise management software: a software tool that helps franchisors to collaborate with franchisees to
manage business functions such as sales, customer relationships and marketing
Inventory management software: a software designed to track and manage inventory items through
various stages along with the supply chain
Shop floor control (SFC): an automated system that has methods and tools which are used to track,
schedule and report the production status for any manufacturing facility
Virtual store: an online store that displays merchandise and order form
Virtual team: a group of workers who communicate and work together by using digital electronic mediums
Voicemail: a system in which callers can leave recorded messages for you over telephone
These systems use a wide range of tools such as spreadsheets, word processors and presentation packages.
Examples: word processing, desktop publishing, voice mail, e-mail, videoconferencing and multimedia
systems
It stores and retrieves business information and also preserves and disseminates the ideas and experienced
knowledge of employees within an organization to improve understanding and problem solving skills.
Examples: research and insights libraries, customer service knowledge bases and online community forums
Examples: hotel reservation systems, payroll systems, credit card authorizations and online bill payments
Batch processing: In this method, information for every transaction is gathered and recorded but processed
later, after a scheduled particular time or when sufficient numbers of transaction are recorded, e.g. cheque
clearance or payroll entries
Benefits of DSS:
• Better decision making
• Achieve a higher level of efficiency
• Boosts an organization’s competitive advantage
• Fast data processing and information retrieval
• Determines potential outcomes
• Aid in planning and management
• Provides report and presentation flexibility
Drawbacks of DSS:
• Information overloaded
• Status reduction
• False belief in objectivity
• Obscuring responsibility
• Transfer of power
• Monetary cost
• Assumption of relevance
• Overemphasize decision making
Examples: sales analysis, production performance and cost trend reporting systems
Advantages of MIS:
• Better decision making in the company
• Helps to achieve a higher level of efficiency
• Boosts an organization’s competitive advantage
• Provides more data about customers
• Improves internal communication between departments
• Improves employees’ productivity
• Fast data processing and information retrieval
• Improved data accuracy
• Provides real-time performance reports
• Optimize utilization of resources
• Simplification of business processes
Disadvantages of MIS:
• Constant update of hardware and software
• High cost of maintenance
• Security, privacy and comparability issues
• Quite expensive to implement and configure
• Heavily reliance on technology
• Risk of implementation failure
• Requirement of skilled and trained workforce
• Budgeting of MIS extremely difficult
Decision Making
Management information systems can be viewed as being constructed to serve various levels and aspects of
management activities in the organizational hierarchy.
Decision making is a cognitive process, used by professionals to determine the best option or course of
action to meet their needs.
Types of Decisions:
i. Certain decision: based on complete and correct information
ii. Un-certain decision: based on correct but in-complete information
iii. Risky decision: based on incorrect or unrealistic information
IS Quality Management
Quality management is the means by which IS department processes are measured, controlled and improved.
Areas of control for Quality management include:
• Software development, maintenance and implementation
• Acquisition of hardware and software
• Day-to-day IT operations
• Security and privacy
• IT personnel management
ISO Standards
ISO 9000 is a series of international standards for quality management.
There are three different sets of quality standards that companies can be registered to ISO: 9001, 9002 and
9003.
ISO 9001 – Standards for companies in design, production, deployment and servicing
ISO 9004 – Guidelines on interpretation of the standards to assist companies in meeting their requirements
Service-level Agreement
A service-level agreement is a written contract between a service provider and a client for the particular
aspects of the service such as quality, availability and responsibilities.
SLA includes:
• Defined levels of service
• Accountability for the service
• Evaluation criteria and basis for improvement
• Performance criteria (availability and reliability)
• Methods and process of delivering the service
• Methods for communicating service expectations and actual performance
• Basis for costing IT services to their customers
• Business continuity planning and disaster recovery
Benefits of SLA:
• Improves customer service
• Facilitates communication
• Negotiated and mutually accepted
• Defines procedures
• Use when there is a question or disagreement
• Sets standards for customer service
Benefits of ITSM:
• Improve efficiency and effectiveness
• Better service and customer experience
• Reduce unnecessary workload
• Enables more effective planning
• Saves the business time and money
• Improve collaboration between different business functions
• Better transparency into IT processes and services
• Higher return on IT investments
• Visualizing workflows is easier
• Standardization and synthesis
• Improves employees productivity
Operating Systems
An operating system is a collection of programs that manage Computer resources, Provides a user interface
and Runs applications.
• Computer Resources: include memory, processing, storage, input & output devices
• User Interface: users interact with application programs and computer hardware through a user interface
• Application: a software that performs specific tasks for an end-user
Drawbacks of OS
• Virus threats to the operating systems are higher
• Expensive compared to the open-source platforms
• Fragmentation risk (a state when storage memory breaks into pieces)
• If the central operating system fails; it will affect the whole system
• Operating systems are highly complex
Examples: computer mouse and keyboard, TV remote control, heavy machinery operator controls, ATMs
Types of Computers
On the basis of Size:
1. Supercomputer
2. Mainframe computer
3. Minicomputer
4. Workstation
5. Personal computers/ Microcomputer
Supercomputers are the biggest and fastest computers that can process trillions of instructions just in a
second.
The performance of a supercomputer is commonly measured in floating-point operations per second (FLOPS)
instead of million instructions per second (MIPS).
Mainframe computer is a big centralized machine that can support hundreds or thousands of users at the
same time.
Midrange computer is a medium sized computer that can supports up to 200 users at the same time. It has
all the features of a mainframe computer but its size is smaller.
Workstation is a high-performance single user computer system with advanced graphics capabilities, large
storage capacity and a powerful central processing unit.
Analogue computer is used where data is changing continuously and we do not need exact values but need
approximate values such as speed, temperature, pressure, etc.
Digital computers can easily perform calculations at high speed and can only understand the binary input
i.e. 0 and 1.
Hardware Acquisition
The major steps of the Hardware selection and acquisition process are listed below:
Hardware Monitoring
Hardware error reports — these reports identify CPU, Input/output (I/O) and power and storage failures
Hardware availability reports — these reports indicate the time periods during which the computer is in
operation and available for utilization by users
Hardware utilization reports — these reports show the use of machine and peripheral devices
• Sequential — one record is processed after another, from the beginning to the end of a file
• Indexed sequential — records are logically ordered according to a data related key and can be accessed
based on that key
• Direct random access — records are addressed individually based on a non-data related key
Capacity management
Capacity management is the planning and monitoring of the computer resources to ensure that the available
resources are being used efficiently and effectively.
Tape backup is the practice of periodically copying data from a primary storage device to the tape cartridges
for backup.
Disk backup refers to the technology that allows one to back up large amounts of data to a disk storage unit.
Advantages of Disk backup:
• Cheaper than tape
• Quick backups and restores
• Efficient medium for daily and weekly backups
• Less possibility for human error
• Allows for easier automation
• Much faster for restoring data
Volatile memory: requires continuous electric current to retain data. When the power is turned off, all data
is erased, e.g. RAM
Non-volatile memory: has the capability to hold saved data even if the power is turned off, e.g. Hard disk
a) Hard disk drive (HDD) – main secondary storage device in a computer with a large data storage capacity
b) Cassette tape – used for audio recording and playback
c) Floppy disk – a 3.5 inch disk which can store 1.44 MB of data
d) Super disk – a diskette that can hold data from 120 to 240 MB
e) Zip diskette – advanced version of the floppy disk with 100 to 750MB capacity
ii. Flash memory devices: any memory storage medium which can be electrically erased and
reprogrammed
a) SSD (Solid State Drive) – new generation of storage devices similar to a hard disk
b) Memory card – used to save digital information especially in digital cameras and mobile phones
c) USB Flash Drive – a small, portable storage device connected through the USB port
iii. Optical storage devices: any electronic storage medium which uses low-power laser beams to record
and retrieve digital data
a) CD (Compact Disc) – a metal-coated plastic disc stores data (up to 700MB) in the form of a pattern, scanned
by a laser beam
b) DVD (Digital Versatile Disc) – a type of compact disc able to store data up to 8.5GB
c) Blu-ray disc – a high-density optical disc, similar to DVD, can store data up to 25GB
Servers
Server is a computer system that provides data, services or programs to other computers, known as clients,
over a network
Some types of Servers in computer networks:
1. Application server – a computer system that is designed to install, operate and host applications
2. Email server – a computer system that sends, receives and stores emails
3. Proxy server – a computer system acts as an intermediary/ gateway between the user and the web server
4. Web server – a computer system that stores, processes and delivers website files to web browsers
5. File server – a computer system responsible for the storage and management of data files
6. Database server – a computer system that is dedicated to provide database services
7. Domain name server (DNS) – a computer system in which internet domain names are located for
matching website hostnames (phonebook of the internet)
8. File transfer protocol (FTP) server – a computer system that enables the transfer of files from one
computer to another via an FTP protocol
Transmission Media
Transmission media is a communication channel that transfers information through the electromagnetic
signals.
i. Twisted pair cable: made up of two insulated wires twisted with each other. Two broad types of twisted-
pair cables are shielded and unshielded twisted pair cable.
ii. Coaxial cable: consisted of two conductors parallel to each other. These are copper cables with better
shielding than twisted pair cables.
iii. Optical fiber cable: made of glass and the transmission of data is based on the concept of reflection of
light through glass
i. Radio waves: the simplest form of transmission signals, frequency ranges from 3 KHz to 1GHz
ii. Microwaves: frequency ranges from 1 GHz to 300GHz
iii. Infrared waves: the highest frequency waves, frequency ranges from 300GHz to 400 THz
Computer Networks
Computer network is a system that connects two or more computing devices together for sharing information.
Intranet
A private computer network, contained within an enterprise
Used to securely share company information among employees
Advantages of Intranet:
• Improves internal communication
• Connects your company across locations and time zones
• Helps employees to find information easily
• Helps performance recognition and reward
• Simplifies employee onboarding
• Provides organizational clarity
• Encourages knowledge sharing
• Reduces meetings
• Improves employee engagement
Extranet
Similar to intranet
But also allows access to trusted external parties, such as business partners, suppliers, key customers, etc.
Advantages of Extranet:
• Lower administrative costs
• Lower travel and other overheads costs
• Reduction in paperwork
• Delivery of accurate information on time
• Improved customer service
• Easy and better communication
• Overall improvement in business effectiveness
Components of LAN:
i. Network interface card (NIC): a circuit board or card that is installed in a computer so that it can be
connected to a LAN
ii. Cable: provides communication between several devices (computers, routers, switches) in a LAN
iii. Hubs: a common connection point for devices in a LAN
iv. Switches: like a hub with more advanced features than Hub, it is also able to receive a packet and transmit
it to the destination computer
v. Server: a computer designed to process requests and deliver data to other computers (clients)
vi. Station: a computer that is connected with a server computer over the LAN
vii. Bridges: a device used to connect two or more LANs
viii. Gateway: a network node that connects two networks together that use different protocols
ix. Routers: used to connect a LAN with an internet connection, it checks the network protocols and addresses
Advantages of LAN:
• Centralized data
• Communication is easy and fast
• Data privacy and security
• Resource sharing
• Computer identification
• Private ownership
• Data transfer rate is higher
Disadvantages of LAN:
• High setup costs
• Covers limited area
• Continuous maintenance
• Constant upgradation needs
Wireless local area network (WLAN): a network that allows devices to connect and communicate
wirelessly to form a local area network
VPN (Virtual private network): a mechanism to create a secure, encrypted online connection over
the Internet
Bus Topology or line topology — in which all the nodes are connected to a single cable
Tree Topology or Star-bus topology — in which star networks are interconnected via bus networks like a
tree. It is also called ‘hierarchical topology’. It should at least have three levels to the hierarchy.
Network architecture consists of transmission equipment, software and communication protocols and
infrastructure of components.
2) Peer-to-peer network
It is a decentralized network architecture where no computer has control over another, each computer is
called a peer and these peers are connected to one another, each of which acts as both client and server so
that each can exchange files directly with every other computer on the network.
Routing
Routing is the process of selecting a path for data traffic in a network or between or across multiple networks
with the help of router.
Switching
Switching is the process in computer networks that helps in deciding the best route for data transmission and
sends a packet of information from one port to the destination port.
2) Circuit-switched network
Circuit-switched network relies on a physical connection (switches) where the communication between the
end devices (nodes) must be set up before they can communicate.
Circuit switching: where a dedicated communication path is established in the physical form between
sender and receiver before data transmission begins
Packet switching: a method of dividing data into suitably-sized packets to make its transmission faster and
more efficient over a network
This reference model defines seven layers of functions that take place at each end of a communication. They
are typically described from top to bottom.
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical
*Mnemonic: All People Seem To Need Data Processing OR People Do Not Need To See Paul Allen
IP (Internet protocol): defines the logical address and dictates that how data should be delivered over the
internet
TCP (Transmission control protocol): a transport protocol, used to ensure reliable transmission of data
packets over the internet
HTTP (Hypertext transfer protocol): a set of rules in the Internet protocol suite model for transferring
hypermedia files — text, images, sound, video and other multimedia files — over the web
Cloud Computing
Cloud computing is the delivery of computing services on rent including — servers, storage, databases,
networking, software, analytics and intelligence services — without direct active management by user.
Public cloud: a computing services offered by third-party providers over the public Internet, making them
available to anyone who wants to purchase them
Private cloud: also known as internal or corporate cloud refers to cloud computing resources used by a
single organization
Hybrid cloud: this model combines public clouds and private clouds which work together to provide a
flexible mix of cloud computing services
Examples: AWS Outposts, Microsoft Azure Stack, Azure Arc, Google Anthos
Platform as a Service (PaaS): the provision of cloud platform for developing, running and managing
software applications
Access control list (ACL): a list which contains rules that grants or denies user’s access to certain digital
environments
Ad-hoc network: a type of LAN created between two devices without utilizing any other networking
infrastructure
Algorithm: a set of instructions to be followed by a computer to solve a computational problem or to
complete a specific task
Arithmetic logic unit (ALU): a digital circuit and a major component of the central processing unit, used to
perform arithmetic and logical operations on binary numbers
Arithmetic and Logical operations: arithmetic operations perform mathematical calculations on numbers
while logical operations uses two logical values to compare which can be true or false
Bandwidth: the maximum amount of data transfer over an internet connection in a given amount of time
Bit: (a short for "binary digit") smallest unit of data that a computer can process and store
Boolean data type: a form of data which has only two possible values ‘true and false’ (0=false, 1=true)
Broadband: the transmission of wide bandwidth data over a high speed internet connection
Browser: any software that allows users to find, access and display the websites, e.g. Chrome, Firefox
Computer engineering: concerned with the designing, developing and testing computer systems and their
components
Computer science: study of the principles of computers and the use of computers
Concurrent software license: a type of license that is based on the maximum number of users of a
software who will use it simultaneously
Data mining: a process of analyzing large data sets to discover hidden patterns, trends and gain insight into
how that data can be used
Data packet: a unit of data that is grouped together and transferred over a computer network along a given
network path
Datagram: a basic data transmission unit in a packet-switched network, primarily used in wireless
communication
DNS (Domain name server): a naming database which provides the information about the IP address of
the webserver that hosting the desired website. It is a phonebook of the internet.
Echo checking: a method of finding out the accuracy of transmission of data in which the transmitted data is
returned to the sending end for comparison with original data
Ethernet: the traditional network technology that connects computers via cables to each other and to the
Internet includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a wired
local area network (LAN) for data transmission via coaxial or fiber optic cables
Expert system: a computer program designed to solve complex problems and to provide decision-making
ability like a human expert, e.g. credit application advisor, process monitor, diagnostic maintenance systems
Fault tolerance: the ability of a system or an application to continue operating without interruption after a
partial failure, when one or more of its components fail
Fuzzy logic systems: a form of many-valued logic in which the truth values of variables may be any real
number between 0 and 1, instead of just the traditional values of true or false
Hardware: any tangible component of a computer, e.g. RAM, Processor, Hard disk
HTML (HyperText Markup Language): a primary standard language used to organize and defines the
structure of web pages
Hyperlink in HTML: an icon, graphic or text that links to another file or object
IP address: the address of a webserver, every machine on the Internet has a unique IP address, e.g.
192.158.1.38, each number in the set can range from 0 to 255. So, the full IP addressing range goes from
0.0.0.0 to 255.255.255.255
Incident management: an ITSM’s process area which deals with the prevention and resolution of incidents
that affect the normal working of an organization’s IT services
Information Technology (IT): the use of computers to create, process, store, retrieve, exchange and
presents all kinds of electronic information
Integrated information system: a combination of software that combines different databases from
various sources with data integration tools
Internet service provider (ISP): a company that provides access for individuals and organizations to the
internet
Knowledge work system (KWS): these systems support the creation of new knowledge and its integration
into an organization
Legacy system: an outdated operating system that is still in use but its older technology will not allow it to
interact with newer systems
Markup language: a computer language that consists of easily understood keywords, names or tags that
help to set out the overall view or structure of an electronic document and the data it contains
Middleware: a software that acts as a bridge between an operating system and applications running on it for
communication and data management. It also enables communication between multiple software
applications.
Mobile computing: a technology that allows transmission of data via any wireless device
Node: a connection point in a communications network and also any computer or other device connected to
a network that sends and receives data
Peripheral device: any device that connected directly to a computer but do not contribute to the
computer's primary functions such as computing, e.g. keyboard, DVD-ROM, Webcam, Printer, etc.
Protocol: a set of rules outlining how connected devices communicate across a network to exchange
information
Remote access: the ability of users to access a device or a network from any location (usually through an
internet connection)
Router: a networking device that receives and sends data on the computer networks
Secure sockets layer (SSL): a security protocol that establishes an encrypted link between client (browser)
and server and provides secure communication over the Internet
Serverless Computing: a cloud computing execution model that provides back-end services and allows
software developers to build and run applications and services without thinking about servers
Service level management: the process of negotiating Service level agreements and ensuring that agreed
services are delivered in a secure, efficient and cost effective manner
Software: any program that tells hardware what to do and how to do it, e.g. Firefox, Adobe reader, VLC
Software metering: a method of software licensing where the licensed software automatically records how
many times and for how long one or more functions of the software are used
Software engineering: branch of engineering that deals with the development of software
Storage medium Vs storage device: the information is stored on medium through device, e.g. card reader
is a storage device and memory card is a storage medium
System: a collection of inter-related objects, working together to achieve some common objectives, e.g. Solar
system, Ecological system, Respiratory system
Telecommunications: the electronic transmission of information over significant distances by various types
of technologies such as telephone, radio, television, satellites
Virtual hypertext network: known as the World Wide Web (WWW), a system of interconnected public
webpages accessible through the Internet
XML (Extensible markup language): a markup language used to define, store and transport data
Database
A database is an organized collection of data, stored and accessed electronically.
Database controls
• Establish and implement data backup and recovery procedures
• Establish various levels of access controls
• Establish controls to ensure only authorized personnel can update the database
• Establish controls to handle concurrent access problems
• Establish controls to ensure accuracy, completeness and consistency of data elements
• Use database checkpoints to restart processing after a system failure
• Use database performance monitoring tools
• Establish definition standards and closely monitor for compliance
Advantages of Database:
• Fast and easy data sharing
• Provides reliable data
• Better decision making
• Increased end-user productivity
• Faster data access
• Data consistency
• Enhance data security
• Greater data integrity and independence
Disadvantages of Database:
• High start-up costs
• Damage to database affects all applications
• Complex and difficult to design
• Database administrator and user requires training
• Requires continuous maintenance
Advantages of DBMS:
• Improves data sharing
• Provides reliable data
• Better decision making
• Increase end-user productivity
• Faster data access
• Reduce data redundancy
• Maximizes data consistency
• Improve data security
• Greater data integrity and independence
• Reduce data management costs
Metadata in DBMS
Metadata is the data that provides information about other data, e.g. Author’s name, date created, date
modified, file size, etc.
Types of Metadata:
I. Structural metadata — data about where and how an object is located in a sequence or hierarchy
II. Technical metadata — data about the size, form and specifications of an object
III. Descriptive metadata — data about elements such as title, author and subjects
IV. Preservation metadata — data used to assure that a file has not been corrupted or lost
V. Rights metadata — data about an object’s copyright status, holder and any relevance licenses
Directory System in DBMS
A Directory System can provide centralized control over data resources and data management.
Data Dictionary: it contains metadata i.e. names, definitions and attributes of data elements
Advantages of Data dictionary and Directory system:
• Improved data quality and data integrity
• Improved documentation and control
• Reduced data redundancy
• Consistency in data use
• Easier data analysis
• Improved decision making based on better data
• Simpler programming
• Enforcement of standards
Database Schema
Schema = Diagrammatic presentation
Database schema is the logical representation of a database in a skeleton structure which shows how the data
is stored logically in the entire database.
i. Physical view: how the machine treats a database? E.g. In the form of bits
ii. Logical view: how a user does perceive a database? E.g. In the form of tables
Database models
Database model defines the logical design and structure of a database and defines how data will be stored,
accessed and updated in a database management system.
Keys in RDB
A key is an attribute or a set of attributes that help to identify a record or row of data in a table.
Types of Keys:
1. Candidate key – a set of columns that uniquely identify rows in the table
2. Primary key – which one that selected from candidate keys and uniquely identifies each record in a table
3. Super key – a superset of primary keys which helps to identify rows in a table uniquely
4. Unique key – all values will have to be unique in this key
5. Composite key – if any single attribute of a table is not capable of being the Primary key then we
combining two or more Candidate keys to form a key
6. Alternate/ Secondary key – all the candidate keys which did not become the primary key
7. Foreign key – an attribute in a table that acts as the primary key in another table, it is used to establish
relationships between two tables
Attributes in RDB
Attribute are the properties or characteristics which describe an entity, e.g. the attributes of a student (entity)
are name, roll number, class, section, age etc.
ERD is a graphical representation of different entities (people, objects, concepts) in a database and how they
relate to each other.
Entity: an object (thing, person or unit) about which you want to store information
Entity key: a property of an entity that are used to determine its identity
Relationships: show how two entities are linked in the database
Attributes: characteristics of the entity
Entity life histories: used to describe what happens to an entity over time
Structured Query Language (SQL)
SQL is a standardized programming language for storing, organizing and retrieving data in a relational
database.
4 Commands of DDL:
CREATE – to create a new table in the database
3 Commands of DML:
INSERT – to insert new rows or records of data into a table
2 Commands of DCL:
Grant – to give user access privileges to a database
4 Commands of TCL:
COMMIT – to save all the transactions to the database
ROLLBACK – to undo a transaction in case of any error occurs
Data Warehouse
Data warehouse is a large storage system for data that can be analyzed for decision making.
Data Warehousing
Data Warehousing is the process of collecting, organizing and managing large amount of data, which collected
from various sources, into one comprehensive database.
Normalization
Normalization is the process of organizing data in a database. This technique meets three basic requirements:
Anomalies
An anomaly is a flaw in databases which occurs because of poor maintenance and poor storing of data in the
flat database. The three types of anomalies are:
i. Insertion anomaly: occurs when data cannot be inserted into a database due to other missing data
ii. Update anomaly: occurs when data is only partially updated in a database
iii. Deletion anomaly: occurs when data is unintentionally lost due to the deletion of other data
Analytical database: also called analytics database, a read-only storage system, built to store and manage
historical data and designed to be used specifically with business analytics, big data and business intelligence
(BI) solutions. These databases are highly complex and large in volume and typically part of a broader data
warehouse
Business analytics: a process, in which businesses use statistical methods and technologies for analyzing
historical data in order to gain new insight, identify trends and patterns, solve present and future problems
and improve strategic decision-making
Big data: refers to the large, complex and diverse collection of data that grows at ever-increasing rates. Its
types are structured, semi-structured and unstructured.
Big data analytics: the use of advanced analytical techniques to extract meaningful insights (such as hidden
patterns, trends, correlations, market trends) against very large and diverse big data sets that can help
companies to make better business decisions
Business intelligence (BI): the use of strategies and technologies by enterprises for data analysis and
management of business information
Business intelligence tools (BIT): the collection of application software that collect and process large
amounts of unstructured data
Data Mart: a subset of a data warehouse that meets the demands of a particular line of business,
department or subject area
Data Element: the basic unit of information that has a precise meaning, used to define the characteristics of
a table field or a component in a database
Information: organized or classified data, which has some meaningful values for the receiver
Master file: the main file that contains permanent records about particular items or entries, periodically
updated and serves as an authoritative source of data
-
Software inventory management: the process of keeping the records of all the software and applications
used within an IT environment
Tape library: a high-capacity storage system used for storing, retrieving, reading from and writing to tape
cartridges
Transaction file: a data file that contains transaction records prior to the updating of a master file
Reasons to obtain new Software
• A new opportunity that relates to a new or existing business process
• A problem with the existing business process
• A problem with the current technology
• When organization to take advantage of technology
In-house Development: involves using the skills of a company’s internal employees to create software
Outsourcing: when a company hires a third-party to create and handle its software development projects
Feasibility Study
A feasibility study is an analysis that considers all of a project's relevant factors.
Determining whether technical resources are enough and whether the technical team is capable of translating
ideas into workable system.
2) Economic Feasibility
Is it possible to complete this project within the budget approved by upper management and stakeholders?
Includes a cost/benefit analysis of the project, which assists businesses in determining the viability, cost and
advantages of a project before allocating financial resources
3) Operational Feasibility
4) Legal Feasibility
Can this project meet the requirements of cyber laws as well as other regulatory compliances?
5) Scheduling Feasibility
Determine whether or not the project can be completed within the timeframe provided.
Feasibility Report
This report evaluates a set of proposed project paths or solutions to determine if they are viable.
Data flow diagram: used to graphically represent the flow of data in a business information system, it is a
more detailed form of a context diagram. DFD can be used to represent systems at different levels of detail.
Pseudocode: an informal high-level representation of the actual code in algorithm form (sequence of actions
and instructions) that human can easily understand. Pseudocode is not actual programming language.
Programming Languages
Programming language is a set of detailed instructions that is used to develop and control software programs.
Application programs must first be coded in a programming language that is easy for a programmer to write
and that can be read by the computer.
Two main types of programming languages are; High- level languages and Low-level languages
Compiler Vs Assembler
Compiler Assembler
Converts High-level language into machine code Converts Assembly language into machine code
Debugging is easy Debugging is tough
More intelligent Less intelligent
Memory occupies more space Memory occupies less space
Supports GCC, C++ and JAVA programming languages Supports GNU and GAS programming languages
Compiler Vs Interpreter
Compiler Interpreter
Scan the full program at a time Scan a program Line by line
Working fast Working slow
Translator Program is required for execution Translator Program is not required for execution
Creates and stores an object file Does not create an object file
Costly Less costly
More secure Less secure
Execution time is less Execution time is higher
Suitable for large programs Suitable for small programs
Supports GCC, C++ and JAVA programming languages Supports Python, Perl and Ruby languages
Coding
Code: a set of instructions or programming statements that are created by a programmer, written in a
particular programming language
Coding: the use of computer programming languages to write the instructions that are used by the
computers to perform tasks
Testing Methods
Testing is the art of the development process that verifies and validates that a program performs the function
for which it has been designed.
In automated testing, tests are executed automatically via test automation frameworks, along with other tools
and software.
White-box testing: also referred to as clear-box, glass-box, transparent-box or structural testing, in which
software’s internal structure, design and coding are tested to verify its input-output flow, design, usability and
security, etc.
Grey-box testing: a method of testing a software system externally and internally by using a combination of
white-box and black-box testing
Functional Testing: verifies the functionality of a software application and to ensure that the
software meets the requirements specified by the user
1) Unit testing: involves the testing of each individual component of the software application
I. Gorilla testing: in which a module of the program is repeatedly tested to ensure that it is working
correctly and there is no bug in that module
2) Integration testing: checking all units of a software to verify that they work together correctly
I. Incremental testing: the developers integrate the modules one by one using stubs or drivers to
uncover the defects
1. Top-down testing: where the highest level modules are tested first and then the lower level
modules are tested
2. Bottom-up testing: where the lowest level modules are tested first and then the higher level
modules are tested
3. Functional incremental integration testing: combines top-down and bottom-up approaches, in
which modules are tested in small groups
II. Non-Incremental testing: also known as big bang testing, in which the data is created in one module
and is combined with all the other modules to test the flow of data between them
3) System testing: testing of the software application as a whole. It is performed after integration testing.
I. Smoke testing: to determine whether the build software is testable and stable or not
II. End-to-end testing: verifies the working order of a software in a start-to-finish process
III. Sanity testing: to verify the newly added functionalities
4) Acceptance testing: conducted to determine if the requirements of the software are met
I. Alpha testing: performed by the testers within the organization before it’s release
II. Beta testing: performed by the end-users within the user's environment
III. User acceptance testing: testing the software by the client to decide whether it can be accepted or not
5) Regression Testing: to confirm that a change or addition in the software has not adversely affected any
existing functionality
Non-functional testing: it is based on the customer's expectations and verifies the non-functional
aspects of a software
1) Security testing: focuses on evaluating the security of a system and checks whether software is
vulnerable to cyber attacks
I. Penetration testing: an authorized simulated attack performed on the software to evaluate its security
2) Performance testing: ensures software applications to perform properly under their expected workload
I. Load testing: a simulated load put on the software to examine how the system behaves during normal
and high loads
II. Stress testing: used to determine how the software system behaves under extreme levels of stress
III. Scalability testing: used to determine how a system responds to changes in the number of
simultaneous users
IV.Stability testing: helps measure an application's ability to function continuously over lengthy periods
V. Endurance testing: also known as Soak testing, where we test the system performance under certain
load conditions over an extensive period
3) Usability testing: used to understand how users interact with the product
I. Accessibility testing: explains how easily one can navigate, access and understand software
4) Compatibility testing: to check whether your software is capable of running with different hardware,
operating systems, applications, devices or network environments
I. Cross platform testing: ensures that an app works correctly with different operating systems and
environments
Direct changeover: the organization selects a particular date that the old system will not be used anymore.
On that date, the users begin using the new system and the old system is unavailable.
Parallel running: using the existing and new system simultaneously until the implementation is judged to be
complete and satisfactory
Phased implementation: replacing the modules of the current system by the new system and allows users
to get used to that particular part of the system and identify any problems before a new area is implemented
until the current system is completely replaced by the new system
Pilot approach: involves rolling out the new system to a small group of users for testing and evaluation. The
new system is tried out at a test site before launching it company-wide
Data Conversion
A large-scale data conversion potentially can become a project within a project as considerable analysis,
design and planning will be required.
Change management: the practice of ensuring all changes to configuration items are carried out in a
planned and authorized manner
Software configuration management (SCM) is a branch of software engineering to provide a better
process to handling, organizing and controlling the changes in requirements, codes, teams and other elements
in the software project development life cycle.
2) Request for proposal (RFP)/ Solicitation of bids/ Request for quotations/ Invitations for bids
Request for proposal is a stage of the business buying process in which the company invites suppliers to
submit proposals. Proposal is a document that describes how a supplier's product or service can satisfy the
needs of a particular client.
3) Proposal submission
Proposal submission means the documents submitted to the company by the suppliers in response to the RFP.
4) Vendor evaluation
It is considering the packages, offered by the vendors, based on different criteria.
5) Vendor interview
The package selection team should meet with the vendors of packages under consideration. The goal of the
vendor interview is to evaluate whether the vendor has the professionalism and expertise to support a
package adequately.
7) Decision approval
After the final selection of a software package, the decision often has to be approved by authoritative figures
before the purchase is made.
8) Contract negotiation
Contract negotiation is the process of defining mutually acceptable terms between a vendor and the company.
SDLC Models
1) Waterfall model
2) Iterative model
3) Incremental model
4) Agile model
5) Spiral model
6) V-model
7) Big Bang model
Waterfall Model
Waterfall Model is a linear sequential model that divides software development into pre-defined phases. One
phase starts only when the previous phase is complete. It is the earliest SDLC approach.
V-Model
The V-Model is an extension of the waterfall model and is based on the association of a testing phase for each
corresponding development stage. It is also known as ‘Verification and validation model’.
Within this model the terms verification and validation have specific meanings:
Strengths of V-Model:
• Simple and easy to use
• Highly disciplined model
• Success rate is higher
• Suitable for smaller projects
• Proactive defect tracking - defects are found at early stage
Deficiencies of V-Model:
• Least flexible
• Can be time-consuming
Spiral Model
Spiral model is a risk-driven software development model. It combines the elements of an iterative model with
a waterfall model. A software project repeatedly passes through its phases in iterations, called ‘Spirals’.
Four Phases of Spiral model:
1. Requirement Analysis and Planning
2. Risk Analysis
3. Coding and Testing
4. Project Evaluation
Iterative Model
The iterative (repetitive) model focuses on an initial simplified development, which then progressively gains
more complexity and a broader feature set until the final system is complete.
Strengths of Iterative model:
• Best suited for agile organisations
• Risks are identified and resolved during iteration
• Progress is easily measured
• Operating time is reduced
• Supports user feedback
• Complexity broken down
• Smaller development teams
Incremental Model
In incremental model, requirements are broken down into multiple standalone modules and each module
passes through the analysis, design, coding and testing phases.
Agile Model
Agile methodology promotes continuous iteration (repetition) of development. It is a combination of iterative
and incremental process model that helps developers to create and deliver applications more quickly,
efficiently and continuously.
Strengths of RAD:
• Encourages customer feedback
• Quick initial reviews occur
• Flexible and adaptable to changes
• Reduced development time
• Increase reusability of components
• Useful to reduce overall project risk
• More productivity with fewer people
• Final product satisfies all stakeholders
• Allows for integration from the start
Deficiencies of RAD:
• Required user involvement
• Cannot be used for smaller projects
• When technical risk is high, it is not suitable
• Requires highly skilled designers and developers
• Requirements can be changed at any time
• Depends on strong team and individual performances
• It can only build modularized projects
This kind of model is adopted in cases where the customer is not sure about his wants and the requirements
are not analysed that well or there might be an urgency in developing new requirements that might have huge
business impact.
Strengths of Big bang model:
• Very simple model
• Used when customer is not sure about his needs
• Little or no planning required
• Easy to manage
• Very few resources required
• No formal procedure to follow
• Ideal for repetitive or small projects
Software Prototyping
Prototype is an initial sample or model of a product that shows the basics of what a product will look like.
Prototyping is a software development method in which a prototype is built, tested and then reworked as
necessary until an acceptable outcome is achieved. It is a simulation of how the software will feel and work.
Strengths of Prototyping:
• Involved user feedback
• Flexible in design
• Missing functionality easily find
• Helps developers and users to understand the system better
• offers much higher levels of client satisfaction
• Early identification of potential errors
Deficiencies of Prototyping:
• Ignoring feasibility
• This model is costly
• Excessive development time
• Insufficient analysis
II. Evolutionary prototypes are developed to solve a problem and are continually fixed and updated to
better solve that problem.
Capacity management: the process of managing available IT resources capacity to ensure that the
resources are used optimally
Computer-aided design (CAD): the use of computer-based software to aid in the creation, modification,
analysis and optimization of a product design
Computer-aided manufacturing (CAM): the use of computer-based software to control machine tools in
a manufacturing process
Computer-aided engineering (CAE): the use of computer-based software to simulate the effects of
different conditions on the design and performance of a product by using simulated loads and constraints.
Broadly defined; CAE incorporates both CAD and CAM
Computer-integrated manufacturing (CIM): a concept used to describe the complete automation of the
entire production process by using computer-controlled machines. It combines various technologies like CAM
and CAD
Cost-benefit analysis: the process of comparing the allocated costs and benefits associated with a project
decision to determine whether it makes sense from a business perspective
Data flow diagram (DFD): used to graphically represent the flow of data in a business information system,
it is a more detailed form of a context diagram
Debugging: the process of finding and fixing errors or bugs in the source code of a software
Exception reports is a type of summary report that states those instances in which actual performance
deviated significantly from expectations.
Reverse engineering: a process in which products are deconstructed to learn how it works to and extract
design information from them
Forward engineering: a process of making the desired software from the specifications in hand which was
brought down by means of reverse engineering
Library control software: it provides assurance that all program changes have been authorized
Proof of concept: refers to a process in which a proposed product is tested to discover whether it can be
turned into a reality
Scrum: an agile software development framework that helps teams structure and manage their work through
a set of values, principles and practices
Scrum Master: a coach for an agile development team who ensures that the team understands and follows
the scrum framework and its principles, values and practices
Software Bug: an error or fault in the design, development or operation of software that causes it to
produce an undesired result or to behave in unintended way
Software Patch: a piece of software, designed to resolve functionality issues, remove bugs, improve security
and add new features in an existing computer program
Software reengineering: the process of modifying existing software systems to improve their performance,
maintainability and adaptability
Software release management: the process of overseeing all the stages involved in a software release
program from software development to its deployment
Unified modeling language (UML): a graphical language that helps software engineers to visualize and
develop software in a standardized way. It is quite similar to blueprints used in other fields of engineering.
What-if analysis: a decision-making tool used to show various projections for some outcome based on
selectively changing inputs
Project
A project is defined as a sequence of tasks that must be completed within a predefined schedule, budget and
quality to attain a certain outcome.
Projects Vs Operations
Projects are defined as unique, temporary endeavors with a specific beginning and end while Operations
constitute an organization's on-going, repetitive activities, such as accounting or production.
Comparison Chart
Characteristics of a Project:
• A one whole thing and recognized as a single entity
• A single definable purpose, end-item or result
• A defined start and end date
• Coordination of the interrelated activities undertaken
• Risk and uncertainty are always associated with projects
• Use resources (time, people, equipment, money)
• Every project is different and unique
Project Constraints
Projects are executed in constraints. The PMBOK recognize 6 constraints:
Project Management
Project management is a step-by-step framework of best practices used to steer a project from its beginning
to its end. It provides project managers a structured way to create, execute and finish a project.
Project Charter
The Project Charter or Project Initiation Document is considered to be the most important document of any
project as it determines Project’s ↴
Scope
Deliverables
Constraints
Stakeholders
Budget and resources
Risks
Roles and responsibilities of participants
Controls and reporting framework
Assessing and closing criteria
When defining the goals of a project, SMART and CLEAR methodologies are the most popular i.e. the goals
should be:
During this phase, you will carry out the tasks and activities from your project plan to produce the project
deliverables.
Gantt Chart
Gantt chart is a horizontal bar chart that is used to visually represent a project schedule such as the start and
end dates of tasks, milestones in project schedule, dependencies between tasks, assignees etc.
Network Diagram
Network diagram is a project management tool that shows the activities, their duration, interdependencies
and the critical path of a project.
It is commonly used in conjunction with the program evaluation and review technique (PERT).
Limitations of CPM:
• Resource intensive
• A lot of time and effort is required
• Does not handle the scheduling of personnel or the allocation of resources
• Can be complicated and complexity increases for larger projects
• Not always clear and needs to be calculated carefully
• Great potential for misusing floats
Program Evaluation and Review Technique (PERT) is a project management planning tool used
to depict a project’s timeline, estimate the duration of tasks, identify task dependencies and determine the
project critical path in chart form.
Pessimistic estimate – when all threats happen and no opportunities take place
Most Likely estimate – when both favorable and unfavorable conditions will happen
Limitations of PERT:
• Subjective analysis
• Inaccuracy in prediction
• Only focuses on time
• Not for long-term projects
• Resource Intensive
CPM Vs PERT
CPM PERT
Activity oriented Event oriented
Manage predictable activities Manage unpredictable activities
Focus on cost optimization Focus on time control
Single time estimate Three-time estimates
A deterministic model A probability model
Used for construction projects Used for R&D programs
Both calculate early and late start and finish times and slack time
Benefits realization management (BRM): a project management methodology that measures how
projects add value to the company and contribute to high-level business objectives
Downsizing: a reorganizing process to reduce costs across the whole operation OR the process of
terminating multiple employees at the same time to reduce the size of workforce
Key performance indicators (KPIs): a set of quantifiable measurements that help to measure how an
organization, business unit or team is performing in meeting objectives
Key success factors (KSF)/ Critical success factors (CSF): the specific activities, procedures or areas in
which an organization or project team needs to perform best to achieve its objectives
PMBOK Guide (Project Management Body of Knowledge): a book of standard terminologies and
guidelines (a body of knowledge) for project management
Timeboxing: a time management technique that involves allotting a fixed, maximum amount of time to an
activity in advance
Audit: a formal, unbiased examination of the financial records of an organization against established
standards and policies
Auditee: the organization and people being audited are collectively called the ‘auditee’
IT Audit
IT Audit or IS Audit is an examination of an organization's IT infrastructure, business applications and
operations against recognized standards and policies.
Objectives of an IT audit:
Achievement of operational goals and objectives
Reliability and integrity of information
Safeguarding of assets
Effective and efficient use of resources
Identify and assess IT risks
Effectiveness of internal controls
Compliance with laws and regulations
Benefits of IT audits:
• Improve decision-making
• Determine adequacy of internal controls
• Ensure compliance with policies and regulations
• Identify operational inefficiencies and waste
• Assess efficient and responsible use of resources
• Detect security vulnerabilities
• Help in mitigating risks in an organization
• Identify and prevents fraud
• Develop IT governance
Limitations of IT audits:
• Not access to full information
• Different from an investigation
• An exercise of judgement
• Faulty or inadequate or Inconclusive evidence
• Limited time for reviewing
Internal Audit
An internal audit is used to assess an organization’s performance, internal controls, corporate governance and
accounting processes against standards.
Internal Auditor
Internal auditor is a company employee who independently and objectively examines an organization’s
operations and infrastructure.
i. Compliance audits – conducted to ensure that an organization is complying with applicable laws,
regulations and industry standards
ii. Systems audits – conducted to assess the design, development, implementation and maintenance of an
organization's IT systems
iii. Operational audits – conducted to assess the efficiency and effectiveness of an organization's IT
operations
iv. Security audits – conducted to assess the security of an organization's IT systems and infrastructure
External Audit
An external audit is an independent examination of a company's financial statements and records by a
Certified public accountant (CPA).
External Auditor
External auditors are the third-party consultants appointed by corporate shareholders with the intent of
carefully examining the validity of the organization's financial records.
Audit Risk
Audit risk (also referred to as ‘Residual risk’) refers to the risk that the auditor may not detect an error or
expresses an inappropriate opinion when the financial statements are materiality misstated.
Audit risk may be summarized in the following equation:
Audit Risk = Inherent risk x Control risk x Detection risk
I. Inherent risk – refers to the natural risk in the financial statements that has not been controlled
II. Control Risk – occurs when a financial misstatement results from a lack of proper accounting controls
III. Detection risk – occurs when the auditor fails to identify material misstatements in the financial
statements of a firm
Substantive testing is an audit activity performed to detect errors or material misstatements in a company's
financial statements.
Audit sampling
Audit sampling is an investigative approach in which less than 100% of the total items within the population
are selected to be audited based on the assumption that every sample has almost the same characteristics of
the complete data it is representing.
In sampling, population means the entire set of data from which a sample is selected and about which the
auditor wishes to draw conclusions.
Audit Evidence
Audit evidence is the documented information collected by an auditor to support the audit findings and on
which the auditor's opinion is based.
Audit report
It is the final document written by the auditors after the completion of the audit. It contains auditor’s opinion.
Materiality
Materiality is a concept in auditing that refers to the amount of misstatement that would affect the decisions
of users of financial statements.
Misstatements are considered to be ‘material’ if they could influence the decisions of users of the financial
statements.
Materiality is a matter of professional judgment and that the auditor must consider:
Significance of the item of the particular entity
Pervasiveness of the misstatement (for example the misstatement might affect the presentation of
numerous items in the financial report)
Effect of misstatement on the financial report as a whole
Nature of the misstatement (type of error or omission that has occurred)
Circumstances surrounding the entity
Size and nature of misstatements
True and fair view means that the financial statements are free from ‘material misstatements’ and
faithfully represent the financial position and performance of the entity.
Internal Controls
A system of internal controls is a set of policies and procedures that an organization implements to ensure the
accuracy and reliability of its information systems.
1) Preventive controls: used to keep errors or irregularities from occurring in the first place
2) Detective controls: used to detect errors or irregularities that may have occurred
3) Corrective controls: used to correct errors or irregularities that have been detected
Risk-based Audit
A risk-based audit is an audit approach that focuses on the areas of a company that are most likely to pose a
risk to the company's objectives and allows management to put the right controls in place for better
performance.
Risk Assessment
Risk assessment is a process to identify potential hazards and analyze what could happen if a hazard occurs.
Risk Mitigation
Risk mitigation is the practice of reducing the impact of potential risks by developing a plan to manage,
eliminate or limit setbacks as much as possible.
CAATs include:
Data analysis and extraction tools (e.g. IDEA)
Spreadsheets (e.g. Excel)
Databases (e.g. Access)
Statistical analysis (e.g. SAS)
Generalized audit software (e.g. ACL)
Business intelligence (e.g. Crystal reports)
Applications of CAATs:
Standard utilities — used to install the package
Test data generators — used to test and verify the logic of application programs
Software library packages — used to verify the integrity and appropriateness of program changes
System control audit review file — used to provide continuous monitoring of the system's transactions
Audit expert systems — used to hold expert knowledge and logic provided by experts for decision-making
Application tracing and mapping system — used to provide linkage of data about internal controls built in the
system
Specialized audit software — used to perform specific audit steps for the IS auditor, such as sampling, footing
and matching
Advantages of CAATs:
• Concurrent auditing
• Continuous monitoring of transaction
• Particularly useful for very large files
• Improves audit effectiveness
• Perform audit more efficiently
• Increase quality and accuracy of audit
• Conduct audits in cost-effective manner
• Enable auditors more freedom with their work and focus on critical areas
• Optimized use of resources
• Reduce audit delivery time
• Eliminate the need to collect sample
• Standardize audit methodologies
• Offering creative and detailed analysis
• Simplified project documentation due to automation
Drawbacks of CAATs:
• Can be expensive and time consuming to set up
• Processing and maintenance costs may be high
• Difficulty in maintenance - needs regular review
• Client permission and cooperation may be difficult to obtain
• Potential incompatibility with the client's computer system
• The audit team may not have sufficient IT skills
• Data may be corrupted or lost during the application of CAATs
Corporate governance is the system of rules, practices and processes by which a company is directed and
controlled.
IT governance (ITG)
IT governance is a framework that ensures the effective and efficient use of IT resources in enabling an
organization to achieve its goals.
IT Governance Frameworks
ISO/IEC 27001 (ISO 27001): provides guidance to organizations implementing and maintaining information
security programs
ITIL (Information Technology Infrastructure Library): provides guidance on how to manage IT services,
from service strategy to service delivery
COBIT (Control Objectives for Information and Related Technologies): developed by ISACA, a
framework to help organizations govern their IT systems and to ensure that information technology (IT) is
aligned with the overall goals objectives of an organization
Policies are the formal statements of an organization's intentions, principles and beliefs. They are used to
guide the behavior of employees and to ensure that the organization operates in a consistent and ethical
manner.
Procedures are step-by-step instructions on how to perform a task or process. They are typically more
detailed than policies and are often used in conjunction with them.
Policies Vs Procedures
Policies Procedures
Basis for procedures Follow the policies
Broad and comprehensive More detailed than policies
General statements of intent More rigid and allow no freedom
Guide for thinking and action Guide for action
Applied in long-range planning Applied in short-range planning
Responsibility of top management Responsibility of managers
Stable Can be changed in the short-run
Examples of Policies:
Attendance and time off policies
Workplace safety policies
Change management policy
Employee conduct policy
VPN usage policy
Remote access policy
Disaster recovery policy
IT training policy
Customer service policy
Examples of Procedures:
Hiring procedure
Onboarding procedure
Training procedure
Performance management procedure
Discipline procedure
Delivery of IT functions
Delivery of IT functions can include:
Insourcing
When a business performs such functions and processes internally that would ordinarily have been performed
by external contractors.
Outsourcing
Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations
or provide services to the company.
Drawbacks of Outsourcing:
• Communication problems (due to different time zones and languages)
• Problems with quality
• Data theft risks
• Loss of control over IS
• Limited product access
• Difficulty to reverse or change outsourcing agreement
• Less legal and regulatory compliance
• Contract terms not being met
• Reputation damage in case of vendor failure
• Lengthy and expensive litigation
IT steering committee
IT steering committee is a group of senior executives who are responsible for setting the strategic direction for
IT in an organization.
Responsibilities of IT department:
Planning and developing IT strategy
Implementing IT solutions
Providing user support
Maintaining IT infrastructure
Administering IT budgets
Train employees on new systems
Perform software updates
License renewal and ensuring compliance
Overseeing IT security and assess potential threats
IT Department’s Roles
Responsibilities of a CIO:
Making IT policies
Developing and executing IT strategic plans
Acquiring and managing IT resources
Carrying out IT investment decisions
Carrying out IT acquisition
Overseeing IT security, compliance and risk management
Reporting to the CEO
IT Director
IT Director is a senior-level IT professional who is responsible for the overall management of the entire IT
system of an organization.
Responsibilities of an IT Director:
Assessing an organization’s technology needs and making recommendations to the CIO
Supervising the maintenance of computer hardware and software
Planning and directing new hardware and software deployments
Purchase efficient and cost effective technological equipment and software
Negotiating with vendors and external service providers
Preparing budgets for vendor purchases
Developing and implementing IT policy
Devising and ensuring security plan for IS
Staying up-to-date on the latest IT trends
Overseeing compliance with IT laws and regulations
IT Manager
An IT manager oversees all computer-related tasks, problems and solutions within a business.
Responsibilities of an IT Manager:
Hiring and training new IT department employees
Regular checks on network and data security
Improve and update IT systems
Sharing regular operation system reports with senior staff
Overseeing and determining timeframes for major IT projects
Providing direction for IT team members
Identifying opportunities for team development and skills advancement
Analyzing technology needs and updates
Coordinating with upper management and executives in achieving company goals
IT Director Vs IT Manager
The IT manager focuses on day-to-day operations, maintaining and upgrading current IT systems and
schedules and coordinates department's activities. In comparison, the IT director is a manager of managers
who oversees the activities of the managers and handle the entire organization's IT operations.
Database Administrator
Database administrator (DBA) is a professional who responsible for the management and security of an
organization's databases.
IT Analyst
IT or IS analyst is an IT specialist who works to ensure that the information systems of an organization are
functioning as effectively and efficiently as possible.
Web Developer
Web developer is a programmer who creates and maintains websites and ensures that the website is visually
appealing and easy to access.
Application Developer
Also known as a Software Architect is a software developer who designs, develops and tests computer
software.
Tape Librarian
Tape librarian is a professional who is responsible for the organization and management of an organization’s
magnetic tape libraries.
Security Administrator
Security administrator is the point person for a cybersecurity team who responsible for installing,
administering and troubleshooting an organization's IT security solutions.
Help desk is a team within a company that provides assistance to IT users when they call to get help with a
problem.
Service desk is a single point of contact (SPOC) between an IT organization and its employees, customers
and business partners. Its purpose is to help users that come with requests and problems.
Hardware Reviews
Hardware Acquisition Review:
• Acquisition plan is compared regularly to management's business plans
• If environment is adequate for current and new installations
• Technical obsolescence of existing and new hardware
• Proper Documentation of HW and SS specifications
PC Acquisition Criteria
• Policy regarding acquisition of usage of PC
• Criteria and procedure for approval and acquisition of PC
• Supporting of cost benefit analysis
• Acquisition through IS purchasing to take advantage of volume discount and quality
Capacity Management Review
• Continuous review of performance and capacity
• Performance monitoring is based on historical data and IS trouble log, processing schedules, job
accounting system reports, preventive maintenance schedules and reports
Review Change Management Controls
• Timely instructions to personnel to change hardware configuration
• Allowance of adequate time for installation and testing of hardware
• Selection of sample of hardware change and procedure
• Ascertain that hardware change is communicated to all concerned
• Effectiveness of change so it do not interfere normal course of action
Selection criteria
Installation and configuration
Documentation
Maintenance
Security
Database Review
In which, the auditor examines the Database’s↴
Design
Access
Administration
Interfaces
Portability
Compatibility
Physical controls
Environmental controls
• Fire and smoke
• Climate
• Water
• Electricity
Logical controls
• Passwords
• Physical possession ID
• Biometric ID
Authorization and authentication
• User profiles and identification
• Trusted paths, firewalls
• Virus prevention and detection
• Cryptographic key management
• Incident handling, reporting and follow up
IS Operations Review
In which, the auditor reviewing:
Selection procedures
Implementation
Documentation
Maintenance activities
Security
Change controls
Acid review
A transaction constitutes a sequence of interactions with the database that represents some meaningful
activity to a user. However, a transaction must have four properties:
Atomicity – means that whole or nothing. A transaction is either committed or rolled back, there is no middle
ground
Consistency – a transaction must preserve the consistency of the database. The effects of transaction are not
reflected in the database until it ‘commits’ its results
Isolation – the events that occur within an organization must be transparent to other transactions that are
executing concurrently. In other words, no type of interference among transactions can be permitted
Durability – means that once a transaction is committed, its changes will be permanent. This means that
even if there is a power failure or other system crash, the changes will not be lost
Lights-out Operations is the practice of running and managing a data center remotely with minimal or no
human intervention.
Input Controls
Input control procedures must ensure that every transaction to be processed is received, processed and
recorded accurately and completely.
These controls should ensure that only valid and authorized information is input and that these transactions
are processed only once.
Output Controls
Output controls provide assurance that the data delivered to the users will be formatted, delivered and
presented in a consistent and secure manner.
Security Committee
Security committee is a group of people who are responsible for the security of an organization. They typically
meet regularly to discuss security threats and vulnerabilities and to develop and implement security policies
and procedures.
Security Administrator
Security administrator is an IT professional, responsible for the security of an organization's computer systems
and networks. He implements, monitors and enforces the security rules that management has established and
authorized.
Data Ownership
Data ownership is the concept of assigning responsibility for data to a specific individual or team. This can be
important for a number of reasons, including:
Data security – helps to ensure that there is a single point of contact for managing and securing data
Data quality – helps to ensure that data is accurate and up-to-date
Data compliance – helps organizations to comply with regulations that govern the collection, use and storage
of data
Data Owners
A data owner is an individual or team that is responsible for the overall management of a specific data set. The
responsibilities include:
Data Custodians
These people are responsible for storing and safeguarding the data and include IS personnel such as systems
analysts and computer operators.
Security Administrator
These are responsible for providing adequate physical and logical security for IS programs data and
equipment.
Data Users
These people often referred to as end users, are the actual users of the computerized data. Their levels of
access into the computer should be authorized by the data owners and restricted and monitored by the
security administrator.
Implementation of Logical, Physical and Environmental security measures help to protect the privacy,
security and confidentiality of systems, information and information resources from unauthorized access.
It is a subset of information security and is often used in conjunction with physical access control to protect
sensitive data.
o Hackers (a skilled computer programmer who uses her abilities to break into the computer systems)
o Script kiddies (the individuals who use scripts and programs written by others to perform their intrusions)
o Employees (authorized or unauthorized)
o IS personnel
o End-users
o Former Employees
o Vendors and Consultants
o Opportunists
o Accidental Ignorant (someone who unknowingly perpetrates a violation)
o Interested outsiders
Competitors
Foreigners
Organized criminals
Crackers (paid hackers working for a third party)
Phreakers (hackers attempting access into the telephone/communication system)
Part-time and temporary personnel
Logical Access Exposures
Logical access exposures are vulnerabilities that allow unauthorized users to gain access to computer systems
or networks. They include:
1) Trojan Horses – any malware that misleads users of its true intent by disguising itself as a standard
program (Troy movie)
2) Rounding Down – involves remove decimal places of money from a computerized transaction and bring it
to the nearest whole number and rerouting this amount to the perpetrator's account, since the amounts
are so small, they are rarely noticed
3) Salami Technique – in which the attacker makes small, incremental changes to a system over time in
order to steal money or data
4) Computer Viruses – a type of malware that spreads between computers and causes damage to data and
software
5) Computer Worm – a type of malware that can replicate itself and spread from one computer to another
without the need for human interaction
6) Logic Bombs – a type of malicious code that is hidden in a computer program, designed to execute when a
specific condition is met such as when a certain employee is terminated or when a specific date is reached
7) Asynchronous Attacks – a type of computer security attack that takes advantage of the fact that different
components of a computer system may not be synchronized with each other
8) Data Diddling – where a person intentionally enters wrong information into a computer system
9) Wiretapping – involves eavesdropping on information being transmitted over telecommunications lines
10) Piggybacking – a security vulnerability that allows an unauthorized user to gain access to a network or
system by following an authorized user through a secured access point
Biometrics
Biometrics is a method of identifying an individual, based on their unique physical characteristics
Palm recognition: where scanner analyzes ridges, valleys and minutiae data found on the palm of the user
Facial recognition: the biometric reader processes an image captured by a video camera and analyzes the
unique features of a person's face
Hand geometry: concerned with measuring the physical characteristics of a user’s hands and fingers from a
three dimensional perspective
Iris recognition: recognition based on the unique patterns of the iris (the colored part of the eye)
Retina recognition: uses optical technology to map the capillary pattern of the eye's retina
Computer Viruses
A computer virus is a type of malware that attaches itself to other programs, replicate itself and spreads from
one computer to another. Viruses can damage files, steal data or disrupt computer operations.
Virus Controls
There are two major ways to prevent and detect viruses, the first is by having sound policies and procedures in
place and the second is by technical means, including anti-virus software. Neither is effective without the
other.
Technical Controls:
Use workstations without floppy disks
Use boot virus protection (i.e. built-in firmware-based virus protection)
Use remote booting
Use a hardware-based password
Use write-protected tabs on floppy disks
Anti-virus
Anti-virus (AV) is a software program that helps keep a computer system healthy and free of viruses.
Unless updated periodically anti-virus software will not be an effective tool against viruses.
3) Machine Learning
The latest evolution in antivirus software involves machine learning. It applies algorithms and huge datasets to
detect malicious patterns and identify malware.
Social engineering
Social engineering is a type of cyber-attack that uses human interaction to trick people into giving up their
sensitive/personal information or taking actions that compromise their security.
Pretexting: where the attacker calls or emails the victim and pretends to be from a legitimate organization.
The attacker will then ask the victim for personal information under the guise of verifying their identity or
helping them with a problem.
Quid pro quo: in which the attacker promises something in exchange for information. For example, the
attacker might offer the victim a free gift or discount if they provide their personal information.
Tailgating: where the attacker follows an authorized person into a secure area. The attacker will often pose
as a contractor or delivery person in order to gain access.
CEO fraud: where the attacker impersonates a high-level executive and sends an email to an employee,
ordering do any specific activity
Scareware: the attacker will often send an email that claims that the victim's computer is infected with
malware and that they need to install a specific program to remove it. The program that the attacker provides
is actually malware itself.
Active attacks are used to modify, destroy or disrupt network traffic. For example, an attacker could use an
active attack to inject malicious code into a network or to deny service to legitimate users.
Media Sanitization
Media sanitization is the process of clearing data from a storage medium so that it can no longer be
recovered.
1) Key cards and fobs are small, electronic devices that contain a unique identifier.
2) PIN pads require users to enter a personal identification number (PIN) to gain access.
3) Biometric scanners use a user's physical characteristics to authenticate users.
4) Magnetic stripe cards are similar to key cards but they use a magnetic stripe to store the user's identifier.
5) Combination locks can be opened by entering a specific combination of numbers.
6) Timed locks are a type of lock that can only be opened during certain time periods.
7) Motion sensors are devices that detect movement.
8) Video cameras should be fixed at strategic points and monitored by security guards.
9) Identification badges (photo IDs) should be worn and displayed by all personnel.
10) Security guards are human security personnel who are responsible for preventing unauthorized entry.
11) Alarm systems are used to alert security personnel of unauthorized entry or other security incidents.
12) Deadman doors, also known as mantraps or airlock entrances, use pressure-sensitive mechanisms to
prevent unauthorized entry.
The absence of network infrastructure security can lead to a number of risks, including:
Loss of data integrity: data may be modified in transit between network nodes, deliberately or otherwise
Denial of Service: disconnection of a network link may prevent the system from providing the services
System compromise: networking devices such as routers, DNS servers, modems are at risk of compromise
and their resources being used for such illegitimate purposes
1) Firewalls
2) Data Encryption
3) Honey Pots and Honey Nets
4) Intrusion Detection Systems (IDS)
5) SSO and Digital Signature
Firewalls
A firewall is a network security system that monitors and controls incoming and outgoing network traffic by
analyzing the data packets based on predetermined security rules.
Packet filtering firewalls: they examine the headers of network packets to determine whether they should
be allowed to pass through the firewall
Stateful inspection firewalls: they track the state of network connections and can make more informed
decisions about whether to allow traffic to pass through the firewall
Application-level firewalls: also known as proxy firewalls, examine the content of network packets. This
allows them to block specific applications or services, even if the packets themselves are not malicious
Next-generation firewalls: NGFWs are a type of firewalls that combines the features of packet-filtering,
stateful and application-level firewalls. NGFWs also include additional features, such as intrusion detection
and prevention that can help to protect networks from a wider range of threats
Data Encryption
Encryption is the process in which the message is encrypted into cipher text that cannot be read by
unauthorized users. This is done by using an encryption algorithm and a key.
The encryption algorithm is a mathematical formula used to encrypt the data and the key is a secret piece of
information used to decrypt the data.
Symmetric key encryption is much faster than public key encryption, often by 100 to 1000 times.
2) Asymmetric encryption
Asymmetric encryption uses two different keys, a public key and a private key.
The public key is used to encrypt and the private key is used to decrypt the data.
This type of encryption is more complex to implement but more secure than symmetric encryption.
*Symmetric key and public key encryption are used often in conjunction, to provide a variety of security
functions for network and information security.
It is designed to look like a real system but it is actually a trap that can be used to gather information about
attackers and their methods.
Honeynet
A honeynet is a network of honeypots that is designed to look like a real network.
Honeynets can be used to gather more information about attackers than honeypots, as they can be used to
track attackers as they move through the network.
Any intrusion activity is typically reported to the security administrator using a ‘security information and event
management (SIEM) system’.
Anomaly-based detection: it determines the normal network activity like what sort of bandwidth is
generally used, what protocols are used, what ports and devices generally connect to each other and alert the
administrator when traffic is detected which is anomalous (not normal)
Stateful protocol analysis: it identifies deviations of protocol states by comparing observed events with
predetermined profiles of generally accepted definitions of benign activity
Digital Signature
A digital signature is a mathematical scheme for verifying the authenticity and integrity of digital messages or
e-documents. A valid digital signature gives a recipient reason to believe that the message was created by a
known sender and that the message has not been altered since it was sent.
Wireless Security
A wireless network refers to a computer network that makes use of Radio Frequency (RF) connections
between nodes in the network.
Wireless security revolves around the concept of securing the wireless network from malicious attempts
and unauthorized access by using wireless networks, which include Wi-Fi networks.
For commercial providers, hotspots and large organizations; the preferred solution is to have an open and
unencrypted but completely isolated wireless network.
There are four main wireless security protocols:
1. WEP (Wired Equivalent Privacy)
2. WPA (Wi-Fi Protected Access)
3. WPA2 (Wi-Fi Protected Access 2)
4. WPA3 (Wi-Fi Protected Access 3)
Audit Trails
An audit trail is a detailed, sequential record of activities that have taken place in a system or application and
can be used to reconstruct events that have occurred in the past.
An audit trail allows the auditors to investigate errors that they have discovered in more detail.
Audit trails are not a substitute for good preventative security measures.
Evidence collected assists in arrests, prosecution, termination of employment and preventing future illegal
activity like intellectual property theft.
Insurance companies – evidence discovered from a computer can be used to mollify costs (fraud, worker’s
compensation, arson, etc.)
Private corporations – obtained evidence from employee computers can be used as evidence in harassment,
fraud and embezzlement cases
Government agencies – use computer forensics to investigate national security threats, to track down
terrorists and to protect classified information
Penetration Testing
A penetration test is an authorized simulated cyberattack on a computer system, performed to evaluate the
security of the system.
Internal penetration testing is conducted from the inside of an organization's network. This type of testing
simulates an attack from an internal attacker, such as an employee or contractor.
External penetration testing is conducted from the outside of an organization's network. This type of
testing simulates an attack from an external attacker, such as a hacker or cybercriminal.
White box penetration testing: for this, system related information is provided to the tester to access the
security against specific attacks. This is used when the company needs to get a complete audit of its security.
Grey box penetration testing: in which, the penetration tester has some knowledge of the target system
or network but not as much as they would in a white box test. It is time saving method and provides more
detailed security assessment practice.
Disaster can be any event that causes significant disruption to an organization's operations. A disaster may
be caused by:
Natural calamities such as earth quakes, floods, tornados, thunderstorms and fire
Events performed by human beings such as terrorist attacks, hacker attacks, viruses or human error
When expected services, such as electrical power, telecommunications and natural gas supply are no longer
supplied to the company
Business Continuity Planning is the process of creating a plan to help your business continue operating
in the event of a disaster.
It should identify the critical functions of your business, how you will keep those functions running and how
you will recover from the disruption.
For the planning, implementation and evaluation phase of the business continuity plan the following should
be agreed upon:
Downtime Costs
Downtime costs are the losses that an organization incurs when its IT systems or other critical infrastructure
are unavailable.
Disaster Recovery Plan (DRP) is a document (set of procedures) that defines how an organization will
recover from a disaster.
Different strategies should be developed and all alternatives should be presented to the senior management
who selects the most appropriate strategy from the alternatives, which should be used for further developing
the detailed business continuity plan.
The DRP must include a communication plan that outlines how the organization will communicate with its
employees, customers and other stakeholders during a disaster.
RPO and RTO are two important concepts in disaster recovery planning. They help organizations to define
their acceptable levels of downtime and data loss in the event of a disaster.
RTO (Recovery Time Objective), also known as CRTP (Critical Recovery Time Period) or MTD (Maximum
Tolerable Downtime) is the maximum amount of time that a business process can be unavailable before it has
a significant impact on the organization.
Recovery Point Objective (RPO) is the maximum amount of data loss that an organization can tolerate. It
represents the maximum period of time that can elapse between a data loss event and the restoration of the
lost data.
RTO and RPO are measured in terms of time. The main purpose of RTO is to select a suitable recovery site and
while the main purpose of RPO is to select a suitable data backup approach.
1) Hot Site
A hot site is a fully equipped operational facility that is located at a different geographic location from the
primary site. It has the same hardware, software and data as the primary site.
2) Warm Sites
A warm site has the same hardware as the primary site but it does not have the same software or data.
3) Cold Sites
A cold site is a facility that has no equipment or data. It has only the basic utilities such as electric power,
cooling system and communication equipment, etc.
These sites are typically used by organizations that do not have the budget for a hot or warm site.
A mobile site is complete with office facilities and computer equipment such as computers, workstations,
telephones, electrical power, office equipment and supplies.
Reciprocal Agreement
It is an agreement made by two or more organizations to use each other's resources during a disaster. This can
include things like space, equipment and personnel.
Contractual Provisions
Contractual provisions for the use of third-party sites should cover the following:
Configurations – Are the vendor's HW/SW configurations adequate to meet company needs?
Disaster – Is the definition of disaster broad enough to meet anticipated needs?
Availability – How soon after a disaster will facilities are available?
Subscribers per site – Does the agreement limit the number of subscribers per site?
Subscribers per area – Does the agreement limit the number of subscribers in a building or area?
Insurance – Is there adequate insurance coverage for company employees at the backup site?
Usage period – How long is the facility available for use?
Communications – Are the communication connections to the backup site are sufficient?
Preference – Who gets preference if there are common or regional disasters?
Warranties – What warranties will the vendor make regarding the availability and adequacy of the facility?
Security – Can the site be adequately secured by the vendor to comply with the company’s security policy?
Testing – What testing rights are included in the contract?
Audit – Is there a right-to-audit clause permitting an audit of the site to evaluate the logical, physical and
environmental security?
Disk backup refers to the technology that allows one to back up large amounts of data to disk storage units.
Cloud-to-cloud backup is the process of copying data from one cloud to another cloud.
SaaS backup refers to backing up data created in SaaS applications such as Microsoft 365 or Google G Suite.
Off-Site Libraries
The secondary storage media (usually tape reels, tape cartridges, removable hard disks or cassettes) are
stored in one or more physical facilities, referred to as off-site libraries, based on the availability of use and
perceived business interruption risk.
Backup Schemes
The three main schemes for backup are:
1) Full backup
2) Incremental backup
3) Differential backup
The best type of backup scheme for you will depend on your specific needs. Usually the methods are
combined, in order to complement each other.
Full Backup
It backs up all of the data on a system, including all files, folders and applications. Full backups are the most
time-consuming and storage-intensive type of backup but they also provide the best protection for your data.
Incremental Backup
It backs up only the data that has changed since the last full backup. This makes incremental backups much
faster and less storage-intensive than full backups. However, you need to have a full back up in place to
restore your data if there is a disaster.
Differential Backup
It backs up all of the data that has changed since the last full or differential backup. It is faster than full
backups but they are not as fast as incremental backups and they require more storage space than
incremental backups.
Telecommunication networks are susceptible to the same natural disasters as data centers and also are
vulnerable to several disastrous events unique to telecommunications. These disasters include central
switching office disasters, cable cuts, communication software glitches and errors, security breaches
connected to hacking and a host of other human mishaps.
2) Alternative routing – the method of routing information via an alternate medium, such as copper cable
or fiber optics. This method uses different networks, circuits or end points if the normal network is
unavailable.
3) Diverse routing – the method of routing traffic through split cable facilities or duplicate cable facilities,
with different or duplicate cable sheaths
4) Long haul network diversity – this ensures long-distance access if any single carrier experiences a
network failure
5) Last mile circuit protection – it uses redundant local carrier T-1s, microwave or coaxial cable access to
the local communications loop. This enables the facility to have access during a local carrier communication
disaster.
Business Continuity Plan Teams
The plan should contain the teams with their assigned responsibilities in the event of a disaster.
The involvement of the following teams depends upon the level of the disruption of service and the types of
assets lost or damaged.
1) Emergency Management Team, also known as Incident Response Team (IRT) is responsible for
coordinating the activities of all other recovery teams, establishing an emergency operations center (EOC)
and handles key decision-making.
This team functions as ‘disaster overseers’ and responsibilities include:
Determine activation of the business continuity plan
Handling legal matters evolving from the disaster, public relations and media inquiries
Retrieving critical and vital data from off-site storage
Identifying, purchasing and installing hardware at the systems recovery site
Installing and testing systems software at the systems recovery site
Operating from the system recovery site
Reestablishing the user/system network
Transporting users to the recovery facility
Reconstructing databases
Supplying necessary office goods. i.e., special forms, check stock, paper
Coordinating systems use and employee work schedules
2) Emergency action team is the ‘First response team’ with designated fire wardens and bucket crew to
deal with fire and perform orderly evacuation of personnel and securing human life.
3) Damage assessment team assesses the extent of damage after the disaster and calculates estimated
downtime.
4) Off-site storage team is responsible for establishing and overseeing an off-site storage schedule and for
ensuring that the organization's data is backed up and stored in a secure manner.
5) Software team is responsible for restoring system packages, loading and testing operating systems
software and monitoring applications performance.
6) Security team continually monitors the security of the system and communication links and resolves any
security conflicts.
7) Emergency operations team consists of shift operators and supervisors residing at recovery sites for
management of operations during disaster recovery.
8) Network recovery team is responsible for establishing network and communication routing and access
at recovery sites.
9) Communications team ensures that the organization's employees, customers and other stakeholders
are kept informed about the disaster and the organization's response.
10) Transportation team ensures that the organization's employees and assets are transported safely and
efficiently to the recovery site.
11) User hardware team is responsible for delivery and installation of office and IT equipment to the
recovery site.
12) Administrative support team provides clerical support to other teams and performs accounting and
payroll functions.
13) Supplies team is responsible for coordinating with suppliers to distribute supplies to the recovery site.
14) Salvage team works to assess the damage, identify the salvageable assets and plan for their recovery.
15) Relocation team coordinates the process of moving from hot site to a new location or to the restored
original location.
Insurance
The information systems processing insurance policy is usually a ‘multi-peril policy’ designed to provide
various types of IS coverage.
Test Execution
To perform testing, these test phases should be completed:
Pre-test
A pre-test consists of the set of actions necessary to set the stage for the actual test, including transporting
and installing required backup equipment, gaining access to the recovery site, accessing recovery
documentation, etc.
Test
The test is the real action of the disaster recovery test. Actual operational activities are executed to test the
specific objectives of the business continuity plan. Applications are failed over; data entry, telephone calls,
information systems processing, handling orders and movement of personnel equipment and suppliers should
take place. Evaluators should review staff members as they perform the designated tasks.
Post-Test
The post-test is the cleanup of group activities. This phase comprises such assignments as restoring the
applications back to the primary location, returning all resources to their proper place, disconnecting
equipment and returning personnel, deleting all company data from third-party systems, etc.
Preparedness Test
Usually a localized version of a full test wherein actual resources are expanded in the simulation of a system
crash. This test is performed regularly on different aspects of the plan.
Documentation of Results
During every phase of the test, detailed documentation of observations, problems and resolutions should be
maintained. This documentation aids in performing detailed analysis of both the strengths and weaknesses of
the plan.
Results Analysis
It is important to have ways to measure the success of the plan and test against the stated objectives. Specific
measurements vary depending on the test and the organization.
The following factors may impact business continuity requirements and the need for the plan to be updated:
• A strategy that is appropriate at one point in time may not be adequate as the needs of the organization
change
• New resources/applications may be developed or acquire
• Changes in business strategy may alter the significance of critical applications
• Changes in the software or hardware environment may make current provisions obsolete or inappropriate
• Changes are made to key personnel or their contact details
BCP Coordinator
The responsibility for maintaining the BCP often falls on the BCP coordinator. BCP coordinator responsibilities
include:
Audit of BCP