MICS Boost Note For CAP III Printable Form
MICS Boost Note For CAP III Printable Form
MICS Boost Note For CAP III Printable Form
The effectiveness of MIS is reduced in organizations where the culture of hoarding information and not
sharing with others exists.
MIS effectiveness decreases due to frequent changes in top management, organizational structure and
operational team.
3. Organizational and IS can be divided into 4 levels. At each level, explain the purposes of the system and
the kind of employee expected to use it [2006-dec(3b)]
4. What are the various components of TPS?
5. Explain various business cycles of TPS?[89]
Revenue Cycle
Events related to the distribution of goods and services to other entities and the collection of
related payments.
Expenditure cycle
Events related to the acquisition of goods and service from other entities and the settlement of
related obligation.
Production cycle
Events related to the transformation of resources into goods and services.
Finance cycle
Events related to the acquisition and management of capital funds, including cash.
6. Characteristics of MIS [71]
Management oriented.
Management directed
Integrated
Common data flows
Heavy planning element
Sub-system concept
7. Mention the factors on which information requirement depend.
Operational function
The operational functions comprise the actual task to be done. E.g. cash issuing when cheque is
submitted.
Types of decision making
The decision is to be done.
This type of information requirement is generally applicable in decision making system for the
supervisory level and executive level.
Level of management activity
Different hierarchy of management has different task to do.
For this the information needs are also different.
Eg. Teller needs information of customer whereas supervisor needs information of total deposits and
total collection.
8. Impact of computers on MIS [106]
Speed of processing and retrieval of data increases
Scope of use of information has expanded.
Scope of analysis widened.
Complexity of system design and operation increased
Integrates the working of different information sub-systems
Increases the effectiveness of IS
More comprehensive information.
9. How do internet and other information technologies support business processes within the
business function of marketing and finance?
For marketing
Interactive marketing
Targeted marketing
Sales force automation
Customer relationship management
Marketing research and forecasting
Advertising promotion
MICS Note -Prepared by Santosh Ghimire
4
Product management
For finance
Cash management
Online investment management
Capital budgeting
10. How does ESS differ from traditional IS
They are specifically tailored==to executive’s information needs.
Able to access data about specific issues and problems.
Provide intensive online analysis tools==including trend analysis, inception reporting.
Can access a broad range of internal and external data
Easy to use
Used directly by executives without assistance.
Screen based== delivered through terminals
Presented by pictorial or graphical means.
Information is presented in summary format.
User:
The user of DSS is generally the manager with unstructured or semi-structured problem to solve.
The user of DSS can be at any level of authority and generally s/he does not require computer
background to use a DSS system for problem solution.
Database
DSS includes one or more databases
These databases contain routine as well as non-routine data from both external and internal sources.
Model Base
Model base is the center of DSS that performs data manipulation and computations with the data
provided by the user.
There are various types of model like mathematical model, statistical model etc.
User Interface Management Component
The user interface management component allows you to communicate with the Decision Support
System.
It consists of the user interface management system.
This is the component that allows you to combine your know-how with the storage and processing
capabilities of the computer.
The user interface is the part of the system you see through it when enter information, commands,
and models.
This is the only component of the system with which you have direct contract.
If you have a Decision Support System with a poorly designed user interface, if it is too rigid or too
cumbersome to use, you simply won’t use it no matter what its capabilities. The best user interface
uses your terminology and methods and is flexible, consistent, simple, and adaptable.
12. Characteristics of the types of information used in executive decision making [106]
Lack of structure
Many of the decisions made are relatively unstructured.
Decisions are not as clear-cut.
Not always obvious which data are required or how to weight available data when reaching
a decision.
MICS Note -Prepared by Santosh Ghimire
5
14. Explain how different hierarchy of management will be benefited with the compute based IS
Top level mgt.==analysis of :
Competitive activities==related with rivalry
Customer preferences
Economic trends, legal rulings and technological changes
Historical sales, costs and other relevant parameters
Profit, cash flow, divisional income, sales, expenses
Financial ratios, interests, credit outstanding etc
Middle level mgt.
Information about price changes, shortages of products and raw materials
Information about the demand and supply, credit conditions
Organizational performance indicators, over-under budgets
Information about sales, incomes, profits/loss etc.
Operational level mgt.
Customer details, staff details, product details
Units sales, expenses, stocks, staffs attendances
Current performances, operational level efficiencies and inefficiencies, input-output
ratios, maintenance reports etc.
15. Differentiate between batch processing and direct processing [63]
Object-oriented programming combines data and the specific procedures that operate on those
data into one object.
The object combines data and program code.
Instead of passing data to procedures==programs send a message for an object to perform a
procedure that is already embedded in it.
Program sends message==object== to perform procedure
The same message may be sent to many different objects, but each will implement that
message differently.
An object’s data are hidden from other parts of the program and can only be manipulated form
inside the object.
The method for manipulating the object’s data can be changed internally without affecting
other parts of the program.
Programmers can focus on what they want an object to do and the object decides how to do
it.
An object’s data are encapsulated from other parts of the system, so each object is an independent
software building block that can be used in many different systems without changing the
program code.
Thus object-oriented programming is expected to reduce the time and cost of writing software
by producing reusable program code or software chips that can be reused in other related
systems.
Object—oriented programming has spawned (created) a new programming technology known
as Visual Programming.
With visual programming, programmers do not write code, rather they use a mouse to select and
move around programming objects, copying an object from a library into a specific location in a
program.
Visual Basic is a widely used visual programming tool for creating applications that run under
Microsoft Windows.
18. How DBMS solves the problems of the Traditional file environment
DBMS can reduce data redundancy and inconsistency by minimizing isolated files in which
the same data are repeated.
DBMS may not enable the organization to eliminate data redundancy entirely but it can help
control redundancy.
Even if the organization maintains some redundant data, using DBMS eliminates data
inconsistency because the DBMS can help the organization ensure that every occurrence of
redundant data has the same values.
DBMS uncouples programs and data, enabling data to stand on their own.
Access and availability of information can be increased and program development and
maintenance costs can be reduced because users and programmers can perform ad hoc queries
of data in the database.
DBMS enables the organization to centrally manage data, their use and security.
IT strategy is a comprehensive plan that information technology management professionals use to guide
their organizations.
An IT strategy should cover all facets of technology management, including
cost management,
human capital management,
hardware and software management,
vendor management,
risk management and
all other considerations in the enterprise IT environment.
Executing an IT strategy requires strong IT leadership; the chief information officer (CIO) and chief
technology officer (CTO) need to work closely with business, budget and legal departments as well as
with other user groups within the organization.
Many organizations choose to formalize their information technology strategy in a written document
or balanced scorecard strategy map. The plan and its documentation should be flexible enough to change
in response to new organizational circumstances and business priorities, budgetary constraints,
available skill sets and core competencies, new technologies and a growing understanding of user needs
and business objectives.
21. IT Infrastructure
It refers to composite
Hardware
Server, Computers, Data centers, Switches, Hubs etc.
Software
ERP, CRM, Productivity applications
Network resources
Internet, Firewall , Security
Services required for the
Existence, Operation & Management of the enterprise IT environment.
It allows an organization to deliver IT solutions & services to its employees, partners &/or
customers & is usually internal to an organization & deployed within owned facilities.
22. IT risks and opportunity
Risk management consists of three essential activities
Risk Identification
Risk Assessment
Risk Containment
How long it will take a new or revised system to become operational &
Communicating this information to the steering committee.
Economic feasibility
It includes an evaluation of all the incremental cost & benefits expected if the
proposed system is implemented.
The financial & economic questions raised by analyst during the preliminary
investigation are:
Cost of conducting full system.
Cost of technology.
The cost if nothing changes.
Benefits in terms of reduced costs.
Technical feasibility
It is concerned with hardware & software.
The technical issues usually raised during this includes: [AT-DAS]
Is the essential technology Available to do the task?
Does the proposed equipment have the Technical capacity to hold the data?
Does the system provide the Data security, reliability & ease of access?
Does the proposed system provide Adequate response to the inquiries
regardless of the number of users?
Does the system have Scalability feature?
3. Underlying principle for system development [JEEP-DDDG]
Justify system as capital investment
Establish phase
Establish standard
Problem solving approach
Divide & conquer
Design system for growth & change
Don’t be afraid to cancel or revise scope
Get the owners & users involved
4. System Development Life cycle/ phases
Preliminary Investigation
When the user comes across a problem in the existing system or a totally new
requirement for computerization → a formal request has to be submitted for system
development to the higher authority.
it consists of 3 parts:
Request classification
Feasibility study
Request approval
After receiving a request, feasibility study is conducted.
It can be done by the company staff also or can be done through outsiders.
If it is feasible, then the approval is sought from top management to initiate system
development.
Requirement/system Analysis
Once the request of the system development is approved → the detailed requirement
study is conducted in close interaction with the concerned employees & managers to
understand the detailed functioning, shortcomings, bottlenecks & to determine the
features to be included in system to match the need & requirements of the users.
Comparison of proposed system is made with the existing system.
Several fact finding tools & methodologies are adopted in this stage for better
understanding of the requirements & problems.
System Design
This activity involves the methodology & steps to be included in the system to meet the
identified needs & requirement of the system.
The analyst designs the various procedures, reports, inputs, files & database structure &
prepares the comprehensive system design.
These specifications are then passed on the development team for program coding &
testing.
System Development
In this stage, new system according to the system design is physically developed or
acquired from the external sources.
This stage comprises of actual physical development or integration of the hardware &
networking & coding of the software.
System Testing
In this stage, the developed system or acquired system is tested in the real time to ensure
that the system will function properly in the real life.
Various testing mechanisms can also be adopted.
The data, operations, results etc. can be verified as if the real life working is done.
Implementation & Maintenance
This is the final & real life working of the system.
The development & tested system is deployed in the real business operation to the end
users.
In this stage, the working of the newly developed system is also evaluated eventually.
The maintenance of the system is also done in case of its failure or pop-up problems.
5. Describe the various models of system development
The development models are the various processes or methodologies that are being selected for the
development of the system depending on the system’s aims and goals.
There are many development life cycle models that have been developed in order to achieve different
required objectives.
The models specify the various stages of the process and the order in which they are carried out.
The selection of model has very high impact on the testing that is carried out.
It will define the what, where and when of our planned testing, influence regression testing and largely
determines which test techniques to use.
There are various Software development models or methodologies. They are as follows:
Waterfall Model
Spiral Model
Incremental Model
RAD Model
Agile Model
Iterative Model
Waterfall model
The Waterfall Model was first Process Model to be introduced.
It illustrates the software development process in a linear sequential flow; hence it is also referred to
as a linear-sequential life cycle model.
All these phases are cascaded to each other in which progress is seen as flowing steadily downwards
(like a waterfall) through the phases.
The waterfall model is a popular version of the systems development life cycle model for software
engineering
It is very simple to understand and use.
In a waterfall model, each phase must be completed before the next phase can begin and there is no
overlapping in the phases.
Waterfall development has distinct goals for each phase of development.
Once a phase of development is completed, the development proceeds to the next phase and there is no
turning back.
Waterfall model is the earliest SDLC approach that was used for software development.
Waterfall Model design
Waterfall approach was first SDLC Model to be used widely in Software Engineering to ensure success
of the project.
In "The Waterfall" approach, the whole process of software development is divided into separate
phases.
In this typically, the outcome of one phase acts as the input for the next phase sequentially.
Every software developed is different and requires a suitable SDLC approach to be followed based on the internal
and external factors. Some situations where the use of Waterfall model is most appropriate are:
Ample resources with required expertise are available to support the product.
The following table lists out the pros and cons of Waterfall model:
Pros Cons
Simple and easy to understand and use No working software is produced until late during the life cycle.
Easy to manage due to the rigidity of the model, High amounts of risk and uncertainty.
each phase has specific deliverables and a review
process. Not a good model for complex and object-oriented projects.
Phases are processed and completed one ata Poor model for long and ongoing projects.
time.
Not suitable for the projects where requirements are at a
Works well for smaller projects where moderate to high risk of changing. So risk and uncertainty is high
requirements are very well understood. with this process model.
Easy to arrange tasks. No working software is produced until late in the life cycle.
Process and results are well documented. Adjusting scope during the life cycle can end a project.
SPIRAL MODEL
The spiral model is similar to the incremental model, with more emphasis placed on risk analysis.
Spiral model is a combination of
iterative development process model and
sequential linear development model i.e. waterfall model
with very high emphasis on risk analysis.
The spiral model has four phases:
i) Objective settings
ii) Risk assessment and reduction
iii) Development and validation
iv) Planning for the next phase
A software project repeatedly passes through these phases in iterations (called Spirals in this
model).
Objective Setting
Specific objectives for that phase of the project are defined.
Constraints on the process & the product are identified & a detailed management plan is drawn
up.
Project risks are identified.
Alternative strategies depending on these risks may be planned.
Risk assessment and reduction
In this phase, for each of the identified project risks, a detailed analysis carried out.
Steps are required to reduce risk.
A prototype is produced at the end of the risk assessment phase.
If any risk is found during the risk analysis then alternative solutions are suggested and
implemented.
Development and Validation
After risk evaluation, software is developed along with testing at the end of the phase
Hence, in this phase the development and testing is done.
The best development model for the system is chosen.
Planning Phase:
The project is reviewed & with a further loop at the spiral.
The difference between spiral model and other is that it considers risk.
The following table lists out the pros and cons of Spiral SDLC Model:
Pros Cons
Allows for extensive use of prototypes End of project may not be known early.
Requirements can be captured more accurately. Not suitable for small or low risk
projects and could be expensive for
Users see the system early.
small projects.
These suggestions are then incorporated into another prototype, which is also used and
evaluated, and this process is repeated until a satisfactory system is developed.
Finally, when a prototype is developed that satisfies all user requirements, either it is refined and
turned into the final system or it is scrapped.
If it is scrapped, the knowledge gained from building the earlier prototype is used to develop the
real system.
Experimenting with prototype helps users to identify additional requirements and needs that
they might have overlooked or forgotten to mention.
The users will also have a clear visual picture of what the final version will look like.
Advantages of prototyping
It encourages & requires active end-user participation. This increases end-user morale & support
for the project.
It is often said that end users don’t know their requirements until they see them implemented. If
so prototyping endorses this philosophy.
Prototype can increase creativity because it allows for quick user feedback which can lead to
better solutions.
Iterations & change are natural consequences of system development. Prototype better fits in this
natural situation.
Prototypes are an active model that the end-users can see, touch, feel & experience.
Disadvantages
Prototyping does not cancel the need of the survey & study phase. It can just only easily solve the
wrong problems & opportunities as a conventionally developed system.
A paper specification cannot be completely substitute by a prototype.
Numerous design issues are not addressed by prototyping.
It involves more time & cost
Object Oriented Design [object=data + process]
Structured methods are useful for modeling processes, but do not handle the modeling of data
well.
They treat data & processes as logically separate entity whereas, in real world such separation
seems unnatural.
Different modeling conventions are used for analysis (data flow diagram) & for design (the
structure chart)
Object oriented design tries to deal with these issues:
Object oriented design uses object as the basic unit of system analysis & design.
An object combines data & the specific processes that operates on those data.
Data encapsulated in an object can be accessed & modified only by the operations or methods
associated with that object.
Object oriented analysis techniques are best suited to projects that will implement system using
emerging object technologies to construct, manage & assemble those objects into useful
computer application e.g. smalltalk, C++, Delphi & visual BASIC
Today most computer operating systems use graphical user interface (GUI’s)
GUI’s are built with object oriented technologies.
Advantages of object oriented design
Real world modeling
Object-oriented system tend to model the real world in a more complete fashion than do
traditional methods.
Objects are organized into classes of objects, and objects are associated with behaviors.
The model is based on objects, rather than on data and processing.
Reduced maintenance
The primary goal of object-oriented development is the assurance that the system will enjoy
a longer life while having far smaller maintenance costs.
Because most of the processes within the system are encapsulated, the behaviors may be
reused and incorporated into new behaviors.
Improved reliability and flexibility
Object-oriented system promise to be far more reliable than traditional systems,
primarily because new behaviors can be "built" from existing objects.
Because objects can be dynamically called and accessed, new objects may be
created at any time.
The new objects may inherit data attributes from one, or many other objects.
Behaviors may be inherited from super-classes, and novel behaviors may be added
without effecting existing systems functions.
High code re-usability
When a new object is created, it will automatically inherit the data attributes and
characteristics of the class from which it was spawned.
The new object will also inherit the data and behaviors from all superclasses in
which it participates.
When a user creates a new type of a widget, the new object behaves "wigitty", while
having new behaviors which are defined to the system
Disadvantages
It is not a solution
Object-oriented Development is best suited for dynamic, interactive environments,
as evidenced by its widespread acceptance in CAD/CAM and engineering design
systems.
Wide-scale object-oriented corporate systems are still unproved, and many bread-
and-butter information systems applications (i.e. payroll, accounting), may not
benefit from the object-oriented approach.
It is not a technology
Although many advocates are religious in their fervor for object-oriented systems,
remember that all the "HOOPLA" is directed at the object-oriented approach to
problem solving, and not to any specific technology.
is not yet completely accepted by major vendors
Object-oriented Development has gained some market respectability, and vendors
have gone from catering to a "lunatic fringe" to a respected market.
Still, there are major reservations as to whether Object-oriented development will
become a major force, or fade into history, as in the 1980's when Decision Support
Systems made great promises, only to fade into obscurity.
Joint Application Development (JAD)
JAD is a methodology that involves the client or end user in the design and development of
an application, through a succession of collaborative workshops called JAD sessions.
The JAD approach, in comparison with the more traditional practice leads to faster development
times and greater client satisfaction, because the client is involved throughout the development
process.
In this, the developer :
investigates the system requirements and
develops an application, with client input consisting of a series of interviews.
JAD offers a team oriented approach to the development of information management solutions
that emphasize a consensus based problem-solving model.
It was introduced as a technique that complements other systems analysis & design techniques
by emphasizing participative development among the system owners, users, designer & builders.
Advantages of JAD
Faster development times.
Client involvement throughout project.
7. Difference between Object oriented analysis approach and module oriented analysis approach
Basis Object oriented Module oriented
System System is seen as a collection of System is seen as a set of functions, data,
objects, each with a functional process & their relationships.
purpose.
Maintenance Easy maintenance of system & at Maintenance is costlier
low cost. Proper & detailed documentation is
needed.
Reuse Since, object can be reused in Reuse of code is limited and infrequent.
different applications, it promotes
reuse of code in large system.
Implement Simple to implement in distributed Difficult to implement in distributed
system. system.
Flexibility Leads to system that are more Lead to less flexible system.
flexible to change.
Ideal Ideal for large system Ideal for small systems.
7. As a security auditor of the IS which has a public website and e-commerce integrated in the
system, what are the major security parameters which you have to check?
The installation quality of the system including power source, environment and temperature
assurance.
To make sure that the access to the system servers and system room is restricted only on the
designated persons.
To check whether proper data and system backup procedures are followed.
Since the system is connected to the public network for public website, have to check if there is
proper firewall of security appliance used to restrict system access from external network.
To make sure that the system team has well-defined guidelines and work description for each
individual.
To make sure that the system is regularly monitored for system errors or alerts and are well-
documented along with the remedies employed.
To check whether the system hardware is well-maintained and the software are properly
tuned with necessary patches and upgrades.
To make sure that the e-commerce activities are properly recorded and the necessary reports
are regularly generated and filed.
8. Designer level role of IT professional
They translate system users’ business requirements and constraints into technical solutions.
They design the computer files, databases, inputs, outputs
9. Consultant Level Role of IT professional
Consultant level role is perhaps the highest and most abstract role of IT professional in an
organization.
Such roles are normally short term, highly focused, well-defined and limited to a particular
project or task.
Because of such focused responsibility, consultants are supposed to be top experts in that
particular area and capable to provide important suggestions and counsel to the organization in
the pre-defined time frame.
Consultants are normally hired at the design or deployment stages of the information system.
Consultant at the design stage normally provides information related to the system design
aspects such as feasibility, architectural layout, development plans etc.
A consultant working at the deployment phase provides inputs to the implementation team to
enable them to make timely and effective deployment while keeping in mind the expected goals
of the system.
Consultant level role hence normally involves a critical study of the process and system and
presentation of constructive ideas and suggestions to the major stakeholders of the system being
designed, developed or deployed.
Consultants may also be hired in cases where a system needs to be discounted and replaced by a
new one.
10. Explain System Analyst role of IT professional. Mention various skills and attributes required to
become successful system analyst.
MICS Note -Prepared by Santosh Ghimire
25
System analysts are people who understand both business and computing
They study business problem and opportunities and then transform business and information
requirements into the computer based information system that are implemented by various technical
specialists, including computer programmer.
System analyst studies the problems and needs of the organization to determine how people, data,
process, communications and information technology can best accomplish improvement for the
business.
The analyst is responsible for the efficient capture of data from its business source, the flow of that data
to the computer, the processing and storage of that data by the computer, and the flow of useful and
timely information back to the business and its people.
System analyst sells business management and computer users the services of information technology.
Various skills and attributes required to become a successful system analyst are
Working knowledge of current information technologies
Computer programming experience and expertise
General business knowledge
Interpersonal communication skills
Interpersonal relationship skills
Flexibility and adaptability
Character and ethics
System analysis and design skills
11. Information Security Administrator Job Responsibilities
The Information Security Administrator generally has the following responsibilities:
Ensures the safety of valuable data stored in computers; prevents data from being destroyed, modified,
or improperly used through networks and Internet fraud.
Assists with the installation of security software products for enterprise platforms.
Develops and implements access control lists for specific computer resources. Distributes information
based on sound security access controls, for all platforms.
Monitors security logs for violations and unsound events; reports information security concerns and
problems, when necessary.
Assisting with development, implementation, and maintenance of IT security solutions including
firewalls, anti-virus solutions, and intrusion detection/prevention systems
Ensuring that Laws and Policies related to security of the company are enforced.
Manage the Information System Security Request form for account creation and deletion
Investigation of any actual or potential information security incidents
Perform reviews of network security architecture, information security administration and policy
Providing periodic reporting on information security issues
Review new system designs and major modifications for security implications prior to
implementation
Provide security awareness training for staff and management
Helps maintain proper documentation in computing environment
Maintains up-to-date knowledge of available and emerging network, security and microcomputer
technologies through professional reading, attending industry conferences, and professional
development (training, education, and participation in professional associations)
Help design and manage the business recovery and disaster recovery plans for the enterprise.
Collaborate with administrative staff in the development and maintenance of the CSM information
security program and information security policy
Collaborate with Network Project Team in identifying network and system vulnerabilities, and the
appropriate solutions to eliminate or minimize their potential effects
Collaborate with ITS staff in the evaluation of new software and hardware systems, particularly as they
relate to security
Collaborate with administrative staff in ensuring that departments have fulfilled their information
security responsibilities
Performs other duties as assigned
Business processes need various forms of internal control to facilitate supervision and
monitoring, prevent and detect irregular transactions, measure ongoing performance, maintain
adequate business records and to promote operational productivity.
Internal auditors review the design of the internal controls and informally propose
improvements, and document any material irregularities to enable further investigation by
management if it is warranted under the circumstances.
Risk of Misstatement
Auditors assess the risk of material misstatement in a company's financial reports.
Without a system of internal controls or an audit system, a company would not be able to create
reliable financial reports for internal or external purposes.
Thus, it would not be able to determine how to allocate its resources and would be unable to
know which of its segments or product lines are profitable and which are not.
Additionally, it could not manage its affairs, as it would not have the ability to tell the status of its
assets and liabilities and would be rendered undependable in the marketplace due to its inability
to consistently produce its goods and services in a reliable fashion.
Accordingly, an audit system is crucial in preventing debilitating misstatements in a company's
records and reports.
Fraud Prevention
Internal audit serves an important role for companies in fraud prevention. Recurring analysis of
a company's operations and maintaining rigorous systems of internal controls can prevent and
detect various forms of fraud and other accounting irregularities.
Audit professionals assist in the design and modification of internal control systems the purpose
of which includes, among other things, fraud prevention.
An important part of prevention can be deterrence, and if a company is known to have an active
and diligent audit system in place, by reputation alone it may prevent an employee or vendor
from attempting a scheme to defraud the company.
Cost of Capital
The cost of capital is important for every company, regardless of its size.
Cost of capital is largely comprised of the risk associated with an investment, and if an investment
has more risk, an investor will require a higher rate of return to invest.
Strong audit systems can reduce various forms of risk in an enterprise, including its information
risk (the risk of material misstatement in financial reporting), the risk of fraud and
misappropriation of assets, as well the risk of suboptimal management due to insufficient
information on its operations.
13. Briefly explain the information system control and audit
IS controls are methods and devices that attempt to ensure the accuracy, validity and propriety of
IS activities.
IS controls must be developed to ensure proper data entry, processing techniques, storage methods and
information output.
IS controls are designed to monitor and maintain the quality and security of the input, processing,
output and storage activities of any information system.
Business should periodically examined or audit the IS by the company’s internal auditing staff or
external auditors from professional accounting firms.
Such audits should review and evaluate whether proper and adequate security measures and
management policies have been developed and implemented.
An important objective of e-business system audits is testing the integrity of an application audit
trail.
An audit trial can be defined as the presence of documentation that allows a transaction to be traced
through all stages of its information processing.
The audit trial of manual information systems was quite visible and easy to trace.
However, computer-based IS have changed the form of the audit trial.
Summary
Methods, device → accuracy, validity and propriety of IS activities
Developed to ensure → date entry, processing, output and storage
Monitor → quality & security of → input, process, output & storage
Should regularly → audit & examined
Adequate security measures → implemented
access of customer relationship management systems by sales and customer service reps
(service and support) and customer collaboration in product development via e-mail
exchanges and Internet newsgroup (marketing/discovery)
2. Advantages of E-commerce
Allows a business of virtually any size that is located virtually anywhere on the planet to conduct
business with just about anyone, anywhere.
The power of e-commerce allows geophysical barriers to disappear, making all consumers and
business on earth potential customer and suppliers.
3. Processes of e-commerce
1. Sitting at the computer, a customer tries to order a product online. His Web browser communicates
back-and-forth over the Internet with a Web server that manages the store's website.
2. The Web server sends his order to the order manager. This is a central computer that sees orders
through every stage of processing from submission to dispatch.
3. The order manager queries a database to find out whether what the customer wants is actually in
stock.
4. If the item is not in stock, the stock database system can order new supplies from the wholesalers
or manufacturers. This might involve communicating with order systems at the manufacturer's HQ
to find out estimated supply times while the customer is still sitting at her computer (in other
words, in "real time").
5. The stock database confirms whether the item is in stock or suggests an estimated delivery date
when supplies will be received from the manufacturer.
6. Assuming the item is in stock, the order manager continues to process it. Next it communicates
with a merchant system (run by a credit-card processing firm or linked to a bank) to take payment
using the customer's credit or debit card number.
7. The merchant system might make extra checks with the customer's own bank computer.
8. The bank computer confirms whether the customer has enough funds.
9. The merchant system authorizes the transaction to go ahead, though funds will not be completely
transferred until several days later.
10. The order manager confirms that the transaction has been successfully processed and notifies the
Web server.
11. The Web server shows the customer a Web page confirming that her order has been processed and
the transaction is complete.
12. The order manager sends a request to the warehouse to dispatch the goods to the customer.
13. A truck from a dispatch firm collects the goods from the warehouse and delivers them.
14. Once the goods have been dispatched, the warehouse computer e-mails the customer to confirm
that her goods are on their way.
15. The goods are delivered to the customer
16. All of these things are invisible—"virtual"—to the customer except the computer he sits at and the
dispatch truck that arrives at her door.
5. Features of E-commerce
Ubiquity
Global rich
Universal standard
Richness
Information density
Personalization/customization
Ubiquity
The word ubiquity means available everywhere and at all the time.
In traditional commerce, a marketplace is a physical place you visit in order to transact.
E-commerce in contrast, is characterized by its ubiquity i.e. it is available just about everywhere and
at all time.
It liberates the market from being restricted to a physical space and makes it possible to shop from
the desktop at home, at work or even in the car using mobile commerce.
The result is market-space, a marketplace extended beyond traditional boundaries and removed
from a temporal and geographical location.
From customer point of view, ubiquity reduces transaction costs-the cost of participating in a
market. i.e. to transact, it is no longer necessary that you spend time and money travelling to a
market.
Global Reach
E-commerce technology permits commercial transactions to cross cultural and national boundaries
far more conveniently and cost-effectively than is true in traditional commerce.
As a result, the potential market size for e-commerce merchant is roughly equal to the size of the
world’s online population.
The total number of users or customers an e-commerce business can obtain is a measure of its reach.
Universal Standards
One of the important feature of e-commerce is that the technical standard of the internet, are
universal standard-that they are shared by all nations all around the world.
In contract, most traditional commerce technologies differ from one nation to the next
For instance, TV and radio standards differ around the world, as does cell telephone technology.
E-commerce is made possible through hardware (Internet) and software/content (World Wide
Web)
The Internet –in its infancy, the architects developed standards that are now globally recognized
(TCP/IP)
The World Wide Web- standards are becoming no. 1 priority (XML, HTML, etc.)
It can greatly influence market entry cost- the cost merchants must pay just to bring their goods to
market.
At the same time for consumer it reduces search costs-the effort required to find suitable products.
And by creating a single, one-world marketspace, where prices and product descriptions can be
inexpensively displayed for all to see, price discovery becomes simple, faster and more accurate.
Richness
Information richness is a framework to describe a communications medium by its ability to
reproduce the information sent over it.
Advertising and branding are an important part of commerce.
E-commerce can deliver video, audio, animation etc. much better than other technologies.
Interactivity
Interactivity means ability of two way communication
E-commerce provide facility of interactivity-that it enables two way communication between
merchant and consumer.
This is where Web technology kick’s the TV’s
Television, for instance cannot ask viewers any questions or enter into conversations with them and
it cannot request that customer information be entered into a form.
Interactivity allows an online merchant to engage a consumer in ways similar to a face-to-face
experience, but on a much more massive, global scale.
Engaging consumer/user is a powerful feature.
MICS Note -Prepared by Santosh Ghimire
31
6. Categories of E-commerce
B2C [Business-to-Consumer]
While most companies that sell directly to consumer can be referred to as B2C companies.
In this form of e-commerce, business must develop attractive electronic marketplace to sell
products and services to consumers.
For eg. Companies may offer:
E-commerce websites that provides virtual store fronts & multimedia catalogue
Interactive order processing
Secure electronic payment system
Online customer support.
B2B [Business-to-Business]
B2B is commerce transactions between businesses, such as between a manufacturer and a
wholesaler, or between a wholesaler and a retailer.
This category of e-commerce involves both the business marketplaces and direct market links
between businesses.
Pricing is based on quantity of order and is often negotiable.
B2B facilitates the transfer of raw materials, parts and components from which additional profit
is derived, through manufacturing or final sales to consumers.
An example of a traditional B2B market is automobile manufacturing.
A vehicle's components are generally manufactured by different companies, and the auto
manufacturer purchases these parts independently.
The tires, hoses, batteries and electronics may be manufactured by separate companies,
and then are sold directly to the automobile manufacturer.
The products themselves do not end up in the hands of consumers, though often, the end
product of the purchasing business does.
Because so many small transactions result in one large business-to-consumer sale, B2B
companies tend to be high volume.
C2C[Customer-to-Customer]
It is a business model that facilitates an environment where customers can trade with each
other.
It involves electronically facilitated transaction between consumers through third party.
Two implementations of C2C markets are auctions and classifieds
A common example is the online auction, in which a consumer posts an item for sale and other
consumers bid to purchase it; the third party generally charges a flat fee or commission. The
sites are only intermediaries, just there to match consumers. They do not have to check quality
of the products being offered.
E-bay
P2P [Peer-to-Peer]
It enables internet users to share files and computer resources without having go through a
central web serer.
It is a decenteralized communication model in which each party has the same capabilities and
either party can initiate a communication session
Eg. Napster.com, which established to aid internet users in finding and sharing online music
files known as MP3 files.
M-commerce
Refers to use of wireless digital device to enable transaction on web.
Computer Crime
Consumer protection
Free speech
Intellectual property
Taxation
Validity of electronic documents
Online gambling
Time and date on documents across borders
Electronic contracts
Benefits of CRM
Identify and target customer
It allows a business to identify and target their best customers; those who are the most
profitable to the business, so that they can be retained as lifelong customers for greater
and more profitable services.
Customization/Personalization
CRM systems give businesses the ability to personalize and customize relationships with
their customers regardless of which employee deals directly with them at any given time.
CRM systems maintain a repository of customer profiles, giving employees the ability to
treat each client individually. As a result, each employee is better informed about each
customer's specific needs.
Feedback
CRM systems also help the company receive feedback from customers regarding products
they have purchased.
Communication channel
CRM helps companies establish better communication channels. Websites, for example,
might make business more convenient for the company and its sales representatives.
Staff manage their time more effectively.
CRM prompts users to follow up on activities and sends automated alerts when important
actions occur.
Security
Manage data and control who has access to certain data and features.
In many companies, the sales force is being outfitted with computers that connect them to web
browsers and sales contact management software.
2. Explain some of the fault tolerance capabilities used in computer systems and network
Fault tolerant describe a computer system or component designed so that in the event that a
component fails, a backup component or procedure can immediately take its place with no loss
of service.
Fault tolerance can be provided with software or embedded in hardware or provided by some
combination.
In the software implementation, the OS provides an interface that allows a programmer to
“checkpoint” critical data at predetermined within a transaction.
In the hardware implementation, the programmer does not need to be aware of the fault-tolerant
capability of the machine.
At a hardware level, fault tolerance is achieved by duplexing each hardware component.
Disks are mirrored.
Multiple processors are “lock-stepped” together and their outputs are compared for correctness.
When an irregularity occurs, the faulty component is determined and taken out of service but the
machine continues to function as usual.
Some of the fault tolerant capabilities used in many computer systems and networks,
Layers Threats Fault tolerant methods
Application Hardware & software Application specific redundancies and rollback to
faults previous checkpoints.
Systems Outages (system down) System isolation, data security, system integrity
Databases Data errors Separation of transactions and safe updates,
complete transactions histories, backup files.
Networks Transmission error Reliable controllers, alternative routing, error
detection and error correction codes.
Processes Hardware & software Alternative computations, rollback to checkpoints
faults
Files Media errors Replication of critical data on different media and
sites, archiving, backup, retrieval
Processors Hardware faults Instruction entry, error correcting codes in
memory and processing, replication, multiple
processors and memories
Internet vulnerabilities
Large public networks such as the internet are more vulnerable than internal networks
because they are virtually open to anyone.
The internet is so huge that when abuses do occur, they can have an enormously
widespread impact.
When the internet becomes part of the corporate network, the organization’s
information systems are even more vulnerable to actions from outsiders.
Internet security professional should be fluent in the four major aspects:
Penetration testing
Intrusion detection
Incidence response
Legal/Audit compliance
Wireless Security Challenges
Wireless networks using radio-based technology are even more vulnerable to
penetration because radio frequency bands are easy to scan.
LAN that use Wi-fi standard can be easily penetrated by outsiders armed with laptops,
wireless cards, external antennae and freeware hacking software.
Hackers use these tools to detect unprotected networks, monitor network traffic and in
some cases, gain access to the internet or to corporate networks.
Wi-Fi transmission technology uses spread spectrum transmission in which a signal is
spread over a wide range of frequencies.
The Service Set Identifiers (SSID) identifying the access points in a Wi-Fi network are
broadcasted multiple times can be picked up fairly easily by intruders’ sniffer programs.
Wireless networks in many locations do not have basic protections against war driving,
in which eavesdroppers drive by building or park outside and try to intercept wireless
network traffic.
3. Security Issues related to e-commerce
i) What are the components of the security mechanism used for electronic commerce?
User authentication mechanism using simple means such as normal user id/password
to more complex means such as smart cards, multi-layer passwords etc.
Use of secure transaction channels over encrypted virtual private network etc.
However, this may not be very effective in public e-commerce sites (B2B, C2C etc)
Use of secure mechanisms such as secure HTTP, public key infrastructure or digital
signatures to ascertain the authenticity of the transactions and their sources.
Use of professional and dedicated third party certification, monitoring and control
mechanism to make sure that the trust level of the transactions are high.
Use of strong system to counter threats such as viruses, intrusion, hacking, man-in-
the-middle attacks etc.
ii)
Computer crime and Cyberterrorism
Computer crime
Use of internet to commit crime
Cyberterrorism
the politically motivated use of computers and information technology to cause severe
disruption or widespread fear.
Cyber warfare
It is Internet-based conflict involving politically motivated attacks on information and
information systems.
Cyberwarfare attacks can disable official websites and networks, disrupt or disable
essential services, steal or alter classified data, and cripple financial systems -- among
many other possibilities.
iii) Security overview
Security has three main concepts
Confidentiality
Allows only authorized parties to read protected information.
Integrity and
It ensures data remain as is from the sender to the receiver.
MICS Note -Prepared by Santosh Ghimire
42
Availability
it ensures you have access and are authorized to resources.
iv) Players in the e-commerce
In a typical e-commerce experience, a shopper proceeds to a website to browse a catalog
and make a purchase.
This simple activity illustrates the four major players in e-commerce security.
One player is the shopper who uses his browser to locate the site.
The site is usually operated by a merchant, also a player, whose business is to sell
merchandise to make a profit.
As the merchant business is selling goods and services, not building software, he usually
purchases most of the software to run his site from third-party software vendors.
The software vendor is the last of the three legitimate players.
The attacker is the player whose goal is to exploit the other three players for illegitimate
gains.
9. Security features/Dimensions of e-commerce security [IN-A-CAP]
Integrity
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.
This means that data cannot be modified in an unauthorized or undetected manner.
Integrity is violated when a message is actively modified in transit. Information security
systems typically provide message integrity in addition to data confidentiality.
Non-repudiation
The ability to ensure that e-commerce participants do not deny their online actions.
In reference to digital security, nonrepudiation means to ensure that a transferred message
has been sent and received by the parties claiming to have sent and received the message.
Nonrepudiation is a way to guarantee that the sender of a message cannot later deny
having sent the message and that the recipient cannot deny having received the message.
Authenticity
In computing, e-Business, and information security, it is necessary to ensure that the data,
transactions, communications or documents (electronic or physical) are genuine.
It is also important for authenticity to validate that both parties involved are who they
claim to be.
Refers to the ability to verify an individual or business identity.
It verifies who you say you are.
It enforces that you are the only one allowed to logon to your internet banking account.
Confidentiality
Determines whether the information stores online such as credit card number, e-mail
communication can be viewed by anyone other than the intended
Availability
For any information system to serve its purpose, the information must be available when it is
needed.
This means that
the computing systems used to store and process the information,
the security controls used to protect it and
the communication channels used to access it must be functioning correctly.
High availability systems aim to remain available at all times, preventing service disruptions
due to power outages, hardware failures, and system upgrades.
Ensuring availability also involves preventing denial-of-service attacks, such as a flood of
incoming messages to the target system essentially forcing it to shut down.
Privacy
Deals with the use of information shared during online transaction consumers want to
limit the extent to which their personal information can be divulged to other organizations
while merchants want
v) Key security threats in e-commerce [HD-SIMS]
Hacking & cyber vandalism
Automated attacks have a higher likelihood of success because the probability of guessing
a user ID/password becomes more significant as the number of tries increases.
Using server root exploits
Root exploits refer to techniques that gain super user access to the server.
This is the most popular type of exploit because the possibilities are limitless.
When a shopper or his computer is attacked, we can only affect one individual but with a
root exploit, we gain control of the merchants and all the shoppers’ information on the
site.
vi) Defenses of Threat of e-commerce
Education
The system is only as secure as the people who use it.
If a weak password is chosen or password is not kept confidential, then an attacker can
pose as that user.
User need to use good judgement while giving out information.
Personal firewalls
When computer is connected in a network, it becomes vulnerable to attack.
A personal firewall helps protect the computer by limiting the types of traffic initiated by
and directed to the computer.
The intruder can also scan the hard drive to detect any stored passwords.
Secure Socket Layer (SSL)
SSL is a protocol that encrypts data between the shopper’s computer and the site’s server.
When SSL protected page is requested, the browser identifies the server as a trusted
entity and initiates a handshake to pass encryption key information back and forth.
Now, on subsequent requests to the server, the information flowing back and forth is
encrypted so that a hacker sniffing the network cannot read the contents.
Server firewalls
Firewall is like a wall that creates protection between two rooms.
It ensures that requests can only enter the system from specified ports and in some cases
ensures that all accesses are only from certain physical machines.
A common technique is to setup a DeMilitarized Zone (DMZ) using two firewalls.
The outer firewall has ports open that allow ingoing and outgoing HTTP requests.
This allows the cl
Client browser to communicate with the server.
The second firewall sits behind the e-commerce servers.
This firewall is heavily strengthen and only requests from trusted servers on specific
ports are allowed through.
Both firewalls use intrusion detection software to detect any unauthorized access
attempts
Another common technique used in conjunction with a DMZ is a honey port server.
A honey port is a resource (for eg. Fake payment server) placed in the DMZ to fool
the hacker into thinking he has penetrated the inner wall.
These servers are closely monitored and any access by an attacker is detected.
Password policies
There should be good password policy to protect from attackers.
The attackers make attempts several passwords to get through several times.
These password policies protect against attacks that attempt to guess the user’s
password.
They ensure that passwords are sufficiently strong enough so that they cannot be easily
guessed.
The account logout capability ensures that an automated scheme cannot make more than
a few guesses before the account is locked.
Site development best practices
This shows the best practices that can be implemented to help secure the site.
Basic rules are:
Never store a user’s password in plain text or encrypted text on the system.
Instead use a one-way hashing algorithm to prevent password extraction.
Employ external security consultants (ethical hackers) to analyze the system.
Ensure that a sufficiently robust encryption algorithm such as triple DES or AES
is used to encrypt all confidential information stored on the system.
When developing third-party software for e-commerce applications, use external
auditors to verify that appropriate processes and techniques are being followed.
Using cookies
12. What is information security? What are the principles of information security? [55]
Information security refers to the protection of data or information against harm from threats
that will lead to its loss, inaccessibility, alteration or wrongful disclosure and this is achieved
through a layered series of technological and non-technological safeguards such as physical
security measures, user identifiers, passwords, smart cards, biometrics, firewalls etc.
Principles [CA-AMIRTS]
Cost Effectiveness
Security must be cost effective.
Different levels and types of security may be required to address the risks to
information.
Security levels and associated costs must be compatible with the values of the
information.
Awareness
Awareness of risks and security initiatives must be spread.
In order to foster confidence in information, data owners process owners,
technology providers, users and other parties with a legitimate interest to learn
or be informed, must be able to gain knowledge of the existence and general
extent of the risks facing the organization and its systems and the organization’s
security initiatives and requirements.
Accountability
Responsibility and accountability must be explicit.
Security of information requires an express and timely apportionment of
responsibility and accountability among data owners, technology providers
and users.
Multidisciplinary
Security must be addressed taking into consideration both technological and non-
technological issues.
Security is more than just technology; it also covers administrative,
organizational, operational and legal issues.
Reassessment
Security must be reassessed periodically.
The security of information system should be reassessed periodically as
information systems and the requirements for their security vary over time.
Integration
Security must be coordinated and integrated.
Measures, practices and procedures for the security of information should be
coordinated and integrated with each other and with other measures, practices
and procedures of the organization and third parties on whom the organization’s
business processes depend, so as to create a coherent system of security.
Timeliness
Security procedures must provide for monitoring and timely response.
Organizations must establish procedures to monitor and respond to real or
attempted breaches in security in a timely manner.
Social factors
Ethics must be promoted by respecting the rights and interests of others.
Information and security of information should be provide and used in such a
manner that the rights and interests of others are respected and that the level of
security must be consistent with the use and flow of information that is the
hallmark of a democratic society.
13. What are the security risks associated with personal computers? What are the security measures
exercised to prevent them?
Security risks
PCs are likely to be shifted from one location to another or even taken outside the
organization.
Decentralized purchasing of PCs can result in hardware/ software incompatibility in the
long run.
Data can be stored in pen drives also which can be very conveniently transported from
one place to another as a result of which data corruption may occur. Mishandling,
improper storage can also cause damage.
The inherent data security provided is rather poor.
There is a chance that application software are not thoroughly tested.
Segregation of duties is not possible owing to limited number of staff
The operating staff may not be adequately trained.
Computer viruses can slow down the system, corrupt data and so on.
14. Define the terms
i) Public key encryption
This is applied as a system testing tool and also as a concurrent audit tool that
examines the way the transactions are processed by marking and recording selected
transactions with a special code.
This also records flow of designated transactions through different logical paths within
programs and help in program logic verification.
An extensive knowledge of information system environment is required for its effective
use.
v) Cracking
The cracking technique is unauthorized access to and use of computer systems, usually
by means of a personal computer and a telecommunication network.
Crackers are hackers with malicious intentions.
vi) Hacking
Unauthorized access to and use of computer systems, usually by means of personal
computer and a telecommunication network.
Hackers do not intend to cause any damage.
vii) Logic time bomb
Program that lies idle until some specified circumstance or a particular time trigger it.
Once triggered, the bomb sabotages the system by destroying program, data or both.
viii) Salami Technique
Tiny slices of money are stolen over a period of time through following actions:
Expenses are increased by a fraction of percentage.
Increments are placed in a dummy account and later pocketed by the perpetrator.
ix) Spamming
E-mailing the same message to every one on one or more use net news groups.
x) Data didling
Changing data before, during or, after it is entered into the system in order to delete,
alter or add key system data.
xi) Eavesdropping
Listening to private voice or data transmissions.
xii) Internet terrorism
Using the internet to disrupt electronic commerce and to destroy company and
individual communication.
xiii) Superzapping
Unauthorized use of special system programs to bypass regular system controls and
perform illegal acts.
xiv) Social engineering
Perpetrator tricks an employee into giving out the information needed to get into a
system.
xv) Scavenging
Gaining access to confidential information by searching corporate records.
xvi) Masquerading or impersonation
Perpetrator gains access to the system by pretending to be an authorized users.
DRP focuses primarily on technical issues involved in keeping systems up & running → such as
which files to backup & the maintenance of back up computer or disaster recovery services.
It is the managerial activity which specifies which employees will participate in disaster recovery,
and what their duties will be; what hardware, software and facilities will be used; and the priority
of applications that will be processed.
Example for necessity of DPR: A credit card company maintain duplicate computer center in a
different geographical area → far from main center.
Rather than building their own backup facility → they may contact with disaster recovery firm.
Disaster recovery firm provides hot-sites housing spare computers at different locations where
subscribing firm can run their critical application in an emergency.
Disaster can be classified into :
Natural disaster
Preventing natural disaster is very difficult but it’s possible to take precaution to
avoid losses.
E.g. fire, landslide, earthquake etc.
Man-made disaster
These are major reasons for failure.
Human error & intervention may be intentional or un-intentional which may cause
massive failure.
E.g. accidents, walkouts, sabotage, burglary, virus, intrusion etc.
2. What are the main aspect of a DRP?
The strategy to restore the system and its normal operation in case of a disaster causing
unavailability of the system.
Provisioning of a disaster recovery system setup, preferably in a separate geographical location.
Detailed data and system backup/restoration action-plan and procedures to make sure that
minimal data loss occurs even in case of major disaster.
Predefined procedure of data recovery and restoration using backup data or other sources.
Mechanism to alert the system operators, administrators and users immediately in the event of
a disaster. This entails proper monitoring and alarm/alert mechanism.
3. What are the Audit tools and techniques used by a system auditor to ensure that disaster recovery
plan is in order?
Automated tools
They make it possible to review large computer systems for a variety of faults in a short time
period.
They can be used to find threats and vulnerabilities such as weak access controls, weak
passwords, and lack of integrity of the system software.
Internal control auditing
This includes inquiry, observation and testing.
The process can detect illegal acts, errors, irregularities or lack of compliance for laws and
regulations.
Disaster and security checklists
These checklists are used to audit the system.
The checklists should be based upon disaster recovery policies and practices, which form
the baseline.
Checklists can also be used to verify changes to the system from contingency point of view.
Penetration testing
It is used to locate vulnerabilities to the system.
4. General steps to follow while creating BCP (Business Continuity Planning)/DRP
Identify the scope and boundaries of BCP.
First step enables us to define the scope of BCP
It provides an idea for limitations and boundaries of plan.
It also includes audit and risk analysis report for institution’s assets.
Conduct a business impact analysis.
Business impact analysis is the study and assessment of effects to the organization in the
event of the loss or degradation of business/mission functions resulting from a
destructive event.
Such loss may be financial or less tangible but nevertheless essential.
Sell the concept to upper management and obtain organizational and financial
commitment.
Convincing senior management to approve BCP/DRP is key task
It is very important for security professionals to get approval for plan from upper
management to bring it to effect.
Each department will need to understand its role in plan and support to maintain it.
In case of disaster, each department has to be prepared for the action.
To recover and to protect the critical functions, each department has to understand the
plan and follow it accordingly.
It is also important for each department to help in the creation and maintenance of its
portion of the plan.
The BCP project must implement the plan.
After approval from the upper management, plan should be maintained and
implemented.
Implementation team should follow the guidelines procedures in plan.
5. Why data backup is necessary?
To backup is to create a redundant copy, so that if anything the original is damaged, it can be
recovered from the backup.
The process can be as simple as copying files to diskettes.
Data backup and recovery process is very important in IT area as this ensures integrity and
security of data in cases of data in cases of disasters, system outages, data corruption, security
breaches and other threats.
Without good data backup and recovery plan, any data lost because of system failures such as
power, network, hardware etc. cannot be recovered.
In the modern computerized society, all corporate activities and operations are based on
computer-based systems for which data are of main importance.
All the transactions related to sales, human resource, procurement, management, inventory,
customer management etc. are computerized and dependent on large centralized or distributed
data centers.
If the data in these systems are lost, corrupted or compromised, whole operation of the
organization can be hampered.
If there is a well-planned data backup and recovery, the system can easily go back to the recent
healthy data by restoring data from backed-up archives.
In case there is no data backup and disaster recovery culture, data once lost and corrupted cannot
be recovered.
DRP is also a measure of data recovery.
Disaster recovery can be done in different ways including data recovery from the archived
backups or also by having the actual system installed in more than one locations.
These additional system locations are also very properly called disaster recovery sites.
Such distributed installations are very widely used in all major data centers and other
computerized IS.
6. Concept of RAID
It is the acronym of Redundant Array of Independent/ Inexpensive disk.
It is a technology that allows:
high level of storage reliability from
i) low cost & ii) less reliable PC class disk-drive components via the technique of
arranging the devices into arrays for redundancy.
RAID is now used as an umbrella term for computer data storage schemes that can:
i) Divide & ii) replicate data among multiple hard disk drives.
RAID combines two or more physical hard disks into a single logical unit → using special
hardware & software solutions.
Hardware solutions are designed to present themselves to the attached system as a single
hard drive, so that the operating system would be unaware of the technical workings.
Software solutions are implemented in OS & would present the RAID volume as a single
drive to applications running within the OS.
There are 3 key concepts in RAID.
Mirroring
Writing of identical data to more than one disk.
Striping
Splitting of data across more than one disk.
Striping means partitioning each drive’s storage space.
Error Checking
Where redundant parity data is stored to allow problems to be detected & possibly
repaired.
Different schemes/architectures are named by the word RAID followed by a number as RAID0,
RAID1 etc.
RAID’s various designs involves two goals:
Increases data reliability &/or
Increases input/output performance
Each RAID scheme affects reliability & performance in different ways.
Every additional disk included in an array increases the likelihood that one will fail, but by using
error checking &/or mirroring the array as a whole can be made more reliable by ability to
survive & recover from a failure.
Types
RAID0
It has block level striping with no
Parity or
Mirroring &
Has no redundancy
It provides
Improved performance &
Additional storage but
No fault tolerance; any disk failure → destroys the array.
RAID1
It has mirroring without
Parity or
Striping
Data is written identically to multiple disks.
Any no. of disks may be used(normally two)
Array provides fault tolerance from disk error.
RAID2
Has bit level striping → with dedicated parity.
7. Explain Computer Assisted Audit Techniques (CAAT)
It is audit techniques that use computer application as a primary tool.
It is generally used for :
Sampling
Statistical analysis
Exception reporting and
for his specialized software, such as
generalized audit software,
test data generator,
computerized audit
Today in most large and medium-sized enterprises, most of the business processes are driven by computers.
Therefore, the performing audit without using information technology is hardly an option.
When all the information needed for doing an audit is on computer system, one had to carry out audits using
the computer.
CASE
CASE stands for Computer Aided Software Engineering which is software that supports one or more software
engineering activities within a software development process, and is gradually becoming popular for the
development of software as they are improving in the capabilities and functionality and are proving to be
beneficial for the development of quality software
Whenever a new system is installed, the implementation integrates a number of related and different tasks.
The process has to be efficiently organized and it is for this very reason that CASE tools are developed.
With the help of CASE, the installation process can be automated and coordinated within the developed and
adopted system life cycle.
CASE tools are the software engineering tools that permit collaborative software development and
maintenance.
Almost all the phases of the SDLC are supported by them such as analysis, design etc. including umbrella
activities such as project management, configuration management etc.
CASE tools may support following development steps for developing database application.
Creation of data flow and entry modules.
Establishing a relationship between requirements and models
Development of functional and process description
Development of test cases.
Why case tools are developed:
Case tools are designed to enhance and upgrade the computing system adopted.
The CASE tools are developed for the following reasons:
Firstly Quick installation.
Time saving by reducing coding and testing time.
Enhance graphical techniques and data flow
Optimum use of available information
Enhanced analysis and design development
Create and manipulate documentation
Transfer the information between tools efficiently
The speed during the system development increased.