31
EMERGING TECHNOLOGIES

EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

EMERGING TECHNOLOGIES

Page 2: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Cloud Computing

Cloud Computing Architecture “Architecture” wala Client Cloud Security Issues “Amrishpuri ki Beti” wala Trust

Cloud Implementation Issues “Dilli k Pyaar” wala Environment Friendly Cloud Computing

Goals of Cloud Computing “Ambani k bete” wala Reduced cost related to Power Consumption

Characters of Cloud Computing “Salman-Katrina” wala Performance Advantages of Cloud Computing ”Bachpan k Pyaar” wala Quick Deployment

Cloud Computing Service Model “Model” wala Infrastructure as a service

Infrastructure as a Service “Baaz” wala Elasticity and Dynamic Scaling Platform as a Service “Ram aur Shyam” wala All-in-one

Software as a Service “Saas” wala Multi Device Support Types of Cloud “Celebrities” wala Private Cloud

Cloud Computing v/s Grid Computing “Govt hospital v/s Pvt hospital” wala Scalability On premises v/s Outsourced Private Cloud “DPS Dance Competition” wala Network

Mobile Computing

Issues in Mobile Computing “Metro cities” wala Security Issues Security Issues in Mobile Computing “Advocate” wala Legitimate

Limitations in Mobile Computing “Mosquitoes” wala Security Standards Benefits of Mobile Computing “Insurance Agent” wala Corporate Knowledge base

Mobile Computing Devices “Assistant” wala Personal Digital Assistant

Component of Mobile Computing “3 points” (Self-learn) Mobile Hardware

Page 3: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point BYOD

Threats of BYOD “Watsapp” wala Device Advantages of BYOD “Happy” wala Happy Employees

Green Computing Best Practices Green Computing Best Practices “Hari” wala Conserve Energy

Conserve Energy “Mission CA” wala Web Conferencing

Reduction in Paper Consumption “Classmate” wala Online Marketing Recycling/Sound Purchase Decision/Green

Computing Plan “Seminar 4.4.6” wala Manufacturer

Manufacturer’s effort Ongoing Communication

WEB 2.0 Components of Web 2.0 “wiki” wala Wikis

Features of Web 2.0 “Google” wala Focus on communities Difference between Web 2.0 & Web 1.0 “Web” wala Find

Application of Web 2.0 in different fields “3 points” (Self learn) Education Categories of Social Network “Memory Crafterz Study Circle” wala Organisation

Life Cycle of Social Network with Web 2.0 “Satellite Classes” wala Analyse need for social Network

Page 4: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

PROTECTION OF INFORMATION SYSTEM

(Part-1)

Page 5: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point {Cyber} world m {PC} ki {Data Integrity and security} k lie {Control} k saath {Security Policy} ki jarurat hoti h

Cyber Bunch Line CA Spam Pakistani Tha…… Cyber Attack “CA Spam” wala Spam

Techniques to Commit Cyber Fraud “Pakistan-America” wala Round Down Impact of Cyber Fraud on Enterprise “Cyber City Gurgaon” wala Competitive Edge

Personal Computer

Risk to PC “PC Shifting” wala Shifting Control Over Data Integrity and Security Bunch Line Army wale Data integrity aur…

Classification of Information “Army” wala Top Secret Data Integrity Policy “Kedaarnath” wala Division of Environment

Data Integrity Control “ATM” wala Source Data Control Security Policy Bunch Line Pranab Baba kisi objective……

Issues to Address “Pranab Mukharjee” wala Responsibilities

5 Types of Security “Babaji” wala Condition of Connection Attributes/Objectives of IS “3 Points” (Self learn) Confidentiality

Components of Security Policy “Rohini” wala Purpose and Scope Control Bunch Line Laila Majnu Gap Bright m…..

Overall Aspect of Control Procedure “Laila-Majnu” wala Quality Assurance

Gap & Risk b/w Need and degree of Protection

“Gap-Bright” wala Decentralization of Mgt & Control

Other Related Topics Bunch Line Aaj k Newspaper m news thi….. Data Security “Newspaper” wala Responsible

Kinds of Sensitive Information “Daud” wala Strategic Plans

Page 6: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point IT General Control “Khadoos” wala Data Centre Physical Security

Control Financial Control “Chanda Kochar” wala Authorisation

Impact of IT on Internal Control “IT Raid” wala Independent Check on

Performance

Access Control Mechanism “Gmail” wala Identification

Page 7: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

PROTECTION OF INFORMATION SYSTEM

(Part-2)

Page 8: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point Classification of Controls

Control based on Audit Function “2 points’ (Self learn) Application Control Application Control “Sachin-Shoaib” wala Input Control

Input Controls “Cheque” wala Batch Control Batch Control “2 points” (Self learn) Physical

Source Document Control “3 points” (Self Learn) Sequence

Data Coding Control “DC” wala Transcription Error Validation Control “3 points” (Self Learn) Field Interrogation

Field Interrogation “Arithmetic k Adyapak” wala Arithmetic Check Record Interrogation “Ribbon Cutting wala Reasonableness Verification

File Interrogation “Flipkart Kalu” wala Internal & External Labelling Processing Control ”Processor“ wala Processor Control

Processor Control “Sachin aur Sehwag” wala Multiple Execution State

Data Processing System Control “Race” wala Field Initialization Output Control “Reportcard” wala Spooling

Boundary Control “Big Bazar” wala Bio-metric Device Communication Control “Umpire ki Beti” wala Internetworking Control

Internetworking Control “3 Points” (Self Learn) Bridge

Physical Component Control “Umpire ki Madam” wala Modem Topological Control “2 Points” ( Self learn) LAN topologies

Channel Access Control “2 Points” ( Self learn) Polling

Line Error Control “2 Points” ( Self learn) Error Detection

Database Control “2 Points” ( Self learn) Report Control Report Control “Kangaal Businessman” wala Recovery Control

Page 9: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point Update Control “Balance sheet” wala Maintain Suspense Account

Managerial Control “IS Hemka” wala IS Management Programming Management “Program” wala Planning, Control

Top Management “Sarpanch” wala Planning, Organizing Data Resource management Control “DR ki beti-MC ka beta” wala Concurrency Control

Backup Control “Breakup Strategies” wala Logging Changes to Data

Security Administration Threats “Virus and Worm” wala Virus and Worms System Development Management “Chaaro” wala Internal Auditor’s Perticipation

Operation Management “Moti-Patlu” wala Help Desk Control based on Objective of Control “4 points” (Self learn) Compensatory

Detective Control Examples of Detective control “IDS Sadar ji” wala Intrusion Detection System

Characters of Detective control “Sardarni” wala Lawful Activities

Preventive Control Example of Preventive Control “CA Praveen” wala Proper Documentation

Characters of Preventive Control “3 points” (Self-learn) Understanding Vulnerabilities Corrective Control

Examples of Corrective Control “Police” wala Rerun Procedures

Characters of Corrective Control “Taj Mahal” wala Getting feedback Control based on IS Resources “3 points” (Self Learn) Physical Access

Physical Access Bunch Line Pehle Control Lagaenge……

Physical Access Control “5 Star Hotel” wala Other means of Controlling Physical Access

Other Means of Controlling Physical Access “Wagah Border” wala Controlled Visitor Access

Page 10: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point Physical Identification Medium “Receptionist” wala Badges for Identification

Locks on Doors “Bolt” wala Bolting Logging of Access “2 points” (Self learn) Manual Logging

Possible Perpetratior “PP Co.” wala Addicted to Gambling Result of Physical Access Violation “Driver Raju” wala Fraud or Embezzlement

Facilities that need to be protected from auditor’s prospective

“ICAI-CD” wala Communication Channels

Logical Access “3 chains” Sabu, Hemraj, Logitech

Logical Access Violator “Sabu” wala Employee

Application that need Access Control Mechanism

“AC Libarary” wala Spooling Queue

Logical Access Path “Operator” wala Operator Console

Issues related to Logical Access Bunch Line Hemraj k Ghar Gurgaon….. Asynchronous Attack “Hemraj” wala Subversive threat

Computer Crime Exposure “Gurgaon” wala Competitive Edge Technical Exposure “Manmohan Singh” wala Trapdoors

Remote & Distributed Data Processing Application Control

“Lalu ki Beti” wala Multiple Locations

Logical Access Control “Logitech Co.” wala Mobile Computing

Operating System Access Control “Airport” wala Operating Requirement Network Access Control “Accountant NAC” wala Recording of Transaction

User Responsibility “2 Points” (Self learn) Unattended User Equipment

User Management “Satyam” wala Privilege Management

Page 11: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topic Story First Point

Monitoring and Application System Access Control

“Modi-Obama” wala Event Logging

Environmental Bunch Line Memory Crafterz k ladke surya ki garmi m……

Information System Resources “Pamphlet” wala IS supporting Infrastructure

Common Environment Threats “Surya Devta” wala Power Spike Control from Environmental Damages` “Lab” wala Water Detector

Page 12: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

AUDIT OF INFORMATION SYSTEM

Page 13: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point {Auditor} ko {Application Security} ki {Audit} k lie {Application} mili. Usne {Concurrent} {Audit Process} use kiya

Auditor Skills of Auditor “Professor” wala Professional Technical Qualification

Functions of Auditor “Ek Aankh wala Auditor” Resource Utilization

Application Security Understanding Application Security “Mote-Mote Logo” wala User Group, User Profile,

Description and Roles Layers of Application Security “3 points (Self learn)” Strategic Layer

Operational Layer “One Liner” Segregation of Duties Audit Bunch Line Audit k Objective ko Achieve…..

Objectives of Audit “Citibank” wala Data Integrity

Audit Trail “Natwarlal Chor” wala Implementation of Audit Trail Steps of IS Audit “6th Paper ISCA” wala Scoping and Pre-audit Survey

Types of IS Audit “Garib Kisan” wala System Development Audit and Control “Seeta aur Geeta” wala Data Loss

Standards of Auditing “NIRC Library” wala Standards on Internal Audit Issued by ICAI

ISACA “One Liner” COBIT Effects of Computer on Audit “Advocate-Judge” wala Changes to Evidence Collection

Changes to Evidence Collection “Advocate” wala Legal Issues

Changes to Evidence Evaluation “Judge” wala Automated TPS

Application Control and their Audit Trail Bunch Line Lataji n input k lie maggi………

Input Control and their Audit Trail “Easyday” wala Batch Output Control and their Audit Trail “Lataji” wala What output presented to user

Page 14: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Boundary Control and their Audit Trail “Football” wala Start & Finish Time

Communication Control and their Audit Trail

“Online Shopping” wala Unique Identifier of Source

Concurrent Concurrent Audit Techniques “Snapshot” wala Snapshot Technique

SCARF Technique “SCARF” wala Performance Measurement Adv. of Concurrent Audit Techniques “Counsellor” wala Training for New User

Disadv. of Concurrent Audit Techniques “Challan System” wala Stable Application System

Performing IS Audit Basic Plan “Action Company” wala Understanding the Entity and

its Operations Preliminary Review “ICICI Bank” wala Knowledge of the Business

Knowledge of the business “Reliance” wala Nature of Business Understanding the Technology “Krishan-Sudama” wala Extended Enterprise

Architecture Inherent Limitation of Audit “Limca Company’ wala Audit Conducted in Reasonable

Period Documentation of Auditing of Environmental Control

“Tata Docomo” wala Staff Trained

Managerial Control and Their Audit Trail “IS Hemka” wala IS management

IS Mgt Control and Top Mgt Control “Sarpanch” wala Planning, Organising Programming Management Control “Program” wala Planning, Control

System Development Mgt Control “3 points (Self learn) General Audit

Page 15: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Governance and Management of Information

System

Page 16: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point {COBIT 5} ne {GRC} ki {Risk management} kr {Others} ko {Information System Assurance} di

COBIT 5 Bunch Line Ek Company jis pr CSR apply….. Customizing COBIT 5 “CSR Activities” wala Mgt & Governance of Enterprise

Need for COBIT 5 “Love Birds” wala Reduced IT Related Risk Seven Enables of COBIT 5 “Playschool” wala Organisation Structure

Components of COBIT 5 “MM College” wala Maturity Model

Principle of COBIT 5 “Hockey” wala Separating Governance from Mgt

37 Governance & Management Processes “Indra Gandhi Airport” wala Governance Processes

Governance Risk & Compliance (GRC) Bunch Line UP ki shadi yamuna xpressway.. GRC Program Implementation “UP ki Shadi” wala Global Approach

Implementation of GRC measured by Goals and Matrices

Yamuna Expressway” wala Reduction in Overall time required

Risk Management Bunch Line DDLJ me Shahrukh Kajol ko……. Risk Management Strategies “DDLJ” wala Accept

Risk Management in COBIT 5 “Kajol 5 Car” wala Risk Identification

Key Mgt Practices fir Implementing Risk Mgt “Principle-Danda-Bachho” wala Collect Data Other Related Topics Bunch Line BCCI ne Virat ko cricket……….

Aligning IT Strategy with Enterprise Strategy “BCCI v/s Indian Team” wala Direction Source of Risk “Wife” wala Natural Disaster Event

Benefits IT Governance “Banglore Bar Dance” wala Contribution

Practices to Determine IT Governance “Janta” wala Governance Results are Monitored and Improved

Functions of Steering Committee “Steering Committee” wala Organisation’s Objective Benefits of Governance “Lalu ki Rail” wala Improving Customer Relationship

Page 17: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Key Matrices to Determine Business Value “Ramlila” wala Expected Benefits are Realized

Benefits of GEIT “Kabaddi” wala Governance requirement Internal Control as per COSO “Kejriwal-Boat” wala Control Environment

Information System Assurance Bunch Line Vijay Malya k kehne pr Modiji… Evaluating IT Governance “Vijay Malya” wala Organisation Structure

Sample Area of GRC for Review by Internal Auditor

“Padosi Desh” wala Interpretation

Assessing and Managing IT Risk “Yuvraj Sing” wala IT Risk

Assessing & Evaluating Internal Control “Mc D” wala Plan Assurance Activities

Page 18: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

ACQUISITION DEVELOPMENT OF INFORMATION

SYSTEM

Page 19: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point System Development Life Cycle

Reason due to which Organisation Fail to Achieve SD objective

“Sweet Daughter” wala New Technologies

Advantages of using SDLC “Project manager” wala Better Control Advantages of using SDLC from Auditor’s

Prospective “Guide” wala Guide

Shortcomings of SDLC “Buldozer” wala Not suitable for Small Projects

8 Phases of SDLC “Ghar Banane” wala Preliminary Investigation Preliminary Investigation “Peeli Shirt” wala Identification of Problem

Identification of Problem (Objective) “DLF k Employee” wala Understanding Project Request

Delineation of Scope “Hema Malini ji” wala Functionality Requirement Technical Feasibility “Annaji” wala Capacity to Hold

Testing Project Feasibility “Fesa Lab” wala Economic System Requirement Analysis Bunch line Kejriwal n facts find krke……..

Fact Finding Techniques “Exam” wala Collection of Documents Analysis of Current/Present System “Havells-Anchor” wala Analysis of Present System

Objective of System Requirement Analysis

“Kejriwal-Election” wala Identify & Consult the Stake Owners

System Requirement Specification “SRS Mall” wala Introduction

Roles Involved in SDLC “SDLC Steering Committee” wala Steering Committee System Development Tools “Nano” wala User Interface

System Analysis of Proposed System “Engagement” wala Methods & Procedure for Relationship B/W Inputs &Outputs to Database

Page 20: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point System Design Activities “Old Lady” wala Design of Acquisition of

Hardware/Software Design of Database “Database” wala Physical Layout Design

User Interface Design “Media” wala Media Characteristics of Physical Design “Model” wala Modular

System Acquisition Bunch Line Prema ki jab Rank-1 ai toh…….. Acquisition Standards “L&T” wala Establishing Acquisition Standard

System Acquisition Considerations “Just Dial” wala Vendor Selection

Vendor Proposal Validation “Nokia ki Battery” wala Cost/Benefit Analysis Method of Validating Proposals “Prema Rank-1” wala Testing Problems

System Development Bunch Line System Development k lie…… Characters of Good Coded Program “CA k Bachhe” wala User Friendly

Other Related Aspects “Programming Language” wala Programming Language Fields of System Testing “One Liner” Memory Crafter ki class ka ek….

System Testing “Pathankot Attack” wala Security Testing

Unit Testing “Punjab ki Shadi” wala Functional Test Techniques of Unit Testing “Ravan” wala Static Analysis Testing

Integration Testing “Bewde” wala Top Down Integration Acceptance Testing “Alpha-Beta” wala Quality Assurance Testing

System Implementation

Activities Involved in System Implementation “Tally to ERP Implementation” wala

Evaluation of System at Regular Intervals

Activities during System Implementation Stage “CA-CS” wala System Changeover Strategies

Page 21: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Changeover Strategies “CS Pilot” wala Pilot Changeover

Conversion Activities “CA Office” wala Scheduling of Personnel & Equipment

Equipment Installation “3 point (Self learn)” Site Preparation

Post implementation Review & System maintenance

“2 points (Self learn) Post implementation Review

Post implementation Review “Shadi k Baad Review” wala Development

Software Maintenance in SDLC “Mumbai Attack” wala Preventive Other Aspects

Characterized methodology of system Development

“Chota Rajan” wala Divide the Project

Operational Manual “ Operational Manual” wala Cover Page

Accountant’s Involvement in Development Work “Accountant” wala Skills Expected from Auditor System Development Methodologies “Preeto Waterfall” wala Prototyping Model

Characters of Prototyping Model “Preeto ki Doll” wala Identify Information System Requirement

Advantages & Disadvantages of Prototyping Model

“Preeto ki Sound Achhi thi” Difficult Function

Characters of Waterfall Model “Ghar Banane” wala Preliminary Investigation

Advantages & Disadvantages of Waterfall Model

“Waterfall m Pen Gir Gya” Conserve Resources

Characters of Incremental Model “Indore Medical College” wala Requirement Analysis

Advantages & Disadvantages of Incremental Model

“T-20 Match ka Incremental Hua h” Earlier Iteration is Used in Development of Later Iteration

Page 22: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point

Advantages & Disadvantages of Spiral Model

“Spiral k Ma Baap Stairs Use Krte the” Enhance Risk Avoidance

Advantages & Disadvantages of RAD Model

“Ronaldo Apni Body s Rapid Bhagta h”

Human Efforts & Saves Time and money

Advantages & Disadvantages of Agile Model

“Agile Bhagwan ka Bhakt tha” Find Requirement

Page 23: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

BUSINESS CONTINUITY PLANNING

AND

DISASTER RECOVERY PLANNING

Page 24: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point BCP & DRP (Chain-1) Bunch Line Sonia Gandhi li Ladki Mirror…...

Methodology of BCP “Ladki” wala Develop a Plan which is Easy to Understand, Implement & Maintain

Backup Techniques “Mirror” wala Mirror

Backup Option “Garam Pani” wala Hot Site Business Continuity Planning “Bus No. 345” wala 3 Areas, 4 Components, 5

Resources DRP Documents “PLB” wala Responsibilities Individual

Components of DRP “Dengue” wala Test BCP & DRP (Chain-2) Bunch Line Perth ki Pitch s Laden n………

Audit the DRP “Perth ki Pitch” wala Audit the Building , Transportation & Utility

Eight Phases of Business Continuity Methodology

“Laden” wala Pre-Planning Activities

Pre-Planning Activities “MDH” wala Understand the Existing & Projected Business

Vulnerability Assessment “Damini” wala Security Assessment

Business Impact Analysis “Cylinder Co.” wala Detailed Definition of Requirement “WWE” wala Hardware

Testing the Plan “Fire Brigade” wala BC Training Programs are Inline with Recovery Procedure

Implementation “Airforce- Surgical Strike” wala Defining the Test Purpose Maintenance Program “Paryavaran” wala Maintenance Environment

Page 25: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Emergency Plan “J & K” wala Who is to be Notified

Objectives of BCP “Bank Manager” wala Provide Safety to People Resources Considered for Backup “Mail” wala Personnel

Audit the Backup & Recovery Procedures

“Navy” wala Observe Working of Alternative Site Developed for Immediate Recovery

Business Continuity Management Bunch Line Memory Crafterz k Top & Middle Mgt m Sunil……….

Development of BCM Culture “Top & middle Mgt” wala Leadership from Senior Personnel

Implementing BC in Enterprise Mgt “Maruti Co.” wala Defining Scope of BCM Program

Business Documentation & Record “MBA k College” wala Business Continuity Mgt System

Business Impact Analysis “Cylinder Co.” wala Determine Impact to Organisation in the Event of Disaster

BCM Information Collection Process “Truck” wala Assets, Resource & Activities

Components of BCM Process “Co. 322333” wala BCM Management Collection Process

BCM Testing “Bhangue” wala Raising Awareness

Training of BCM “Stars” wala Team work for Resolution & handling disruption

BCM Maintenance “Motel” wala Ownership

BCM Development & Implementation

Process “Accident” wala Nature & Extent of Incident

Audit Reviewing/ Arrangement/ Self-Assessment

“Hospital” wala Plan, Policies & Strategies are Effective

Page 26: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

FILE INFORMATION SYSTEM CONCEPT

Page 27: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Different Information System

Computer Based {Car} Bunch Line BMW n Badhiya Character ki … Characteristics of Computer Based “BMW ki Car” wala Pre-defined Objectives

Major Area of Computer based Appn “Gujarat m Car Factory” wala Finance & Accounts Components of CBIS “One Liner” People

Executive Information System {v/s} Bunch Line Chhote Shehar k logo k paas…..

Characters of Information used in EIS “Chhote Shehr v/s Bade Shehr” wala Future Orientation Principle to Guide Design Measures &

Indicators in EIS “Non-computer v/s Computer” wala Information Available to

Everyone in the Organisation Characteristics of EIS “facebook v/s Skype” wala Online Usage

Decision Support System {Visual} Bunch Line Factory set up kr databse wali… Use of DSS in Accounting Application “Factory k Visual” wala Capital Budgeting

Components of DSS “Database k Visual” wala Database Characteristics of DSS “Ghar k Visual” wala Management Level

Office Automation System {Sidhu} Bunch Line Sidhu n Office ki Ladki ko…….

Office Automation System “Sidhu k Office” wala Text Processor & related System

Benefits of Office Automation System “Sidhu ki Cycle” wala Smooth Flow of Communication

Activities Performed by OAS “Sidhu k Card” wala Document Capture Transaction Processing System {JCB} Bunch Line JCB s Activity karane k lie……

Activities in TPS “Self-learn” Capture Data & Organise Files Components of TPS “JCB k Components” wala Inputs

Features of TPS “JCB k Features” wala Handle Large volume of Data

Page 28: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point Management Information System {Aur} Bunch Line Purane Director ka beta ca tha..

Characteristics of MIS Purane Director Aur Nae Director” wala

Sub System Concept

Pre-requisites of MIS “CA Aur MBA” wala Qualified System & Mgt Staff Misconception About MIS “Lab Aur Doctor” wala Reporting System

Constraints in Operating Computer based MIS

“Employee Aur Manager” wala No Standardization of MIS

Major Limitation of MIS “Husband Aur Wife” wala Quality of Output is Governed by Quantity of Input

Expert System {CA Faculties} Bunch Line Aggarwal Sir ki shadi m VG sir aur Rajkumar Sir Present the

Pre-requisites of Expert System “Aggarwal Sir” wala Domain Benefits of Expert System “VG Sir” wala Real Life Expert

Business Application of Expert System “Rajkumar Sir” wala General Business

Mini wali Chain Bunch Line Mini Exam k Schedule k karan... Application of Data Mining “Mini” wala Web Analysis

Attributes/ Character of Information “Exam k Schedule” wala Current/ Updated Benefits of ERP “Benefit of ABC” wala Customer Satisfaction

Elements of CBS “Muthut Finance” wala CRM Activities Classification/Types of System “Elephant” wala Element

Technical Name used by Technical Staff “Technical” wala Knowledge Mgt System

Components of Electronic Message Communication System

“3 Points (Self learn) Voice Mail

Features of E-mail “Metro k Card” wala Economical

Page 29: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Topics Story First Point

Overview of IT Tools “HP” wala Computer System, Laptop, Webcam, Printer & Scanner

Important Implication of IS “Idea-Airtel” wala Innovative Ideas

Difference b/w EIS & Traditional IS “Difference-1” Information Provided Difference b/w DSS & Traditional MIS “Difference-2” Philosophy

Other Aspects of IS Concept Different Information System One Liner Management Level System

Knowledge required to Business Manager “Department of IT” wala Business Application

Impact of IT on Information System “Public Sector” wala Public Sector

Page 30: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

INFORMATION TECHNOLOGY ACT

Page 31: EMERGING TECHNOLOGIES · Backup Control “reakup Strategies” wala Logging Changes to Data Security Administration Threats “Virus and Worm” wala Virus and Worms System Development

Jai Hind Jai Bharat

Topics Story First Point {Cyber Law} k {ISO 27001} m likhe h {ITIL} related {Compliances} Cyber Law Objective of IT Act “E-Commerce” wala E-Commerce

Scope of IT Act “Jamun” wala Trust Compliance with Cyber Laws “Police ki Recruitment” wala Reporting Machanism

Objective of Cyber Security Police, 2013 “SSC” Wala

ISO 27001 Benefits of ISO 27001 “Self-Learn” Extension to Quality System

Reason to Adopt ISO 27001 “Chinese v/s Indian Co.” wala Demonstrate Security Status 10 Clauses of ISO 27001-2013 “Picture Method” Scope

ISO 27001-2013 Specifies in 14 Groups Sholey Movie” wala Information Security Policy ISO 27001 Information Security

Management Standard Confidentiality

Five Phases of ITIL “V3S Library” wala Service Strategy

Service Strategy “FM” wala Business Relationship Mgt

Service Design “Pind Balluchi” wala IT Service Continuity Mgt Service Transition “Honda Co.” wala Knowledge Mgt

Service Operation “ Event Mgt” wala Event Mgt Other Compliances

Four Phases of ISMS “Criminal” wala Plan

SA-402 “SA 402” wala Obtaining Understanding of Service

Persons Effected by Computer Crime “Software Professional” wala Certifying Authorities Web Hosting

IRDA Audit Preliminaries “Self-Learn” Standard Operating Procedures