adsense

Saturday, 18 October 2014

ISCA Important Topics for November 2014

Chapter 1 : Concepts of Governance and MIS  [ Probable weight age : 8-12 Marks ]

  • Governance dimensions
  • What is IT Governance and explain its benefits .
  • 5  Internal control components [ COSO framework ] – V.imp .
  • Steps to be followed for aligning IT Strategy with Enterprise Strategy
  • Definitions of Risk ,Threat , Vulnerability , Threats likelihood , Exposure , Countermeasure .
  • 5 Risk management strategies .
  • COBIT 5.0 , Benefits of COBIT , 5 Principles of COBIT [ V.IMP]  and
  • 7 Enablers of COBIT .

Chapter 2 : IS Concepts [ Probable weight age : 10-15 Marks ]

  • Types of System .
  • Information and its Attributes .
  • Components of CBIS
  • Charters tics of CBIS .
  • What is TPS and explain its features .
  • What is MIS ,
  • Misconceptions of MIS ,
  • Characteristics of MIS ,
  • Constraints in operating MIS
  • limitations of MIS .
  • Characteristics of Decision support system ?
  • Contents of EIS / Guidelines to Design the EIS .
  • Explain the features of email .
  • Benefits of expert system
  • Properties that a potential system should possess to qualify for an Expert system ?
  • Knowledge which an manager should possess to operate IS effectively and efficiently? [ V. IMP ]



Chapter 3 : Protection of IS [ Probable weight age : 10-15 Marks ]

  • What is Risk and why do Gap arise ?
  • Objectives of IS Security [ June 2014 - 4 Marks]
  • What is IS Policy and what are its contents [ Imp ]
  • Types/ Hierarchy of IS Policy
  • Effect of Computer / technology in Internal control
  • What is meant by compensatory control
  • What is Boundary control and explain different boundary control techniques .
  • Explain Control over Data Integrity [ Information classification , categories and policies ] – imp.
  • Logical access paths
  • What are the different types of
  • Technical exposures if logical access controls are absent
  • Computer crime exposures if logical access controls are absent
  • Asynchronous attacks
  • Techniques to commit cyber frauds . [ Short question ]

Chapter 4 : BCP & DRP [ Probable weight age : 6-10 Marks ]

  • What is meant by BCM ? Explain the terms associated with BCM .
  • BCP Manual ?
  • Advantages of  Business continuity .
  • BCP Policy ? Objectives of BCP policy ? [ V. Imp]
  • What is meant by BCP ? Areas covered by BCP .
  • Objectives and Goals of BCP ?
  • What is BIA ?
  • Discuss Test plan ?
  • Alternate processing facilities arrangements ? [ Imp ]
  • Types of Backup 

Chapter 5 : Acquisition , development and implementation of IS  [ PW : 15-20 Marks ]

  • Reasons for failure of System development activity ?
  • Discuss System development methodology ?
  • 6 approaches for System development [ Most imp : Prototype , RAD & Spiral ]
  • What are the points to be addressed in Delineation of Scope ?
  • Fact finding technique ? [ Hint : Phase  2 ]
  • What are Points to addressed while analyzing Present system ? [ V. Imp]
  • What is meant by SRS ? Explain its contents ? [ June 2014]
  • What is meant by Data Dictionary ?
  • Designing System output & System Input ?  [ V. Imp]
  • 4 Design Principles ? [ Short note ]
  • Methods for Validation Vendors Proposal ? [ Hint : 5 Methods discussed in Phase 4  ]
  •     Characteristics of good Coded Program ?  [ Imp ]
  • Total testing phase [ Phase 5 ] is important . [ Contains Unit testing , Integration testing ,System testing and User acceptance testing]
  • What are the activates involved in System conversion ? [ Hint : 4 activities discussed in Phase 6 ]
  • System implementation conversion strategies ?
  • What is PIR ? Methods ?
  • System maintenance and its types [ June 2014 ]

Chapter 6 : Auditing  of IS [ Probable weight age : 10-15 Marks ]

  • Need for Audit of IS ?
  • Effect of computers on Audit ?
  • Skill set that an IS auditor should possess for Auditing IS environment  ? [ V. Imp]
  • Categories of IS Audit ?
  • Steps in IT Audit ?
  • Categories of Risk [Hint : Inherent Risk , Control Risk , Detection Risk ]  – [ V. Imp]
  • 4 different types of Audit tools [Hint : Snapshot , ITF , SCARF , CIS ]  – [ V. Imp]
  • Advantages and disadvantages of Continuous Auditing ?
  • Audit trial and its Objectives ?
  • What are the task performed by OS or Importance of OS ? – [ V. Imp]
  • Discuss Various Backup Strategies ?
  • Discuss System development Control [ Hint : 4th  General control ]
  • Internet and Intranet control ?
  • Processing Control ? [ Hint : 2nd Application control ]


Chapter 7 : Information Technology Regulatory Issues [ Probable weight age : 10-15 Marks ]

 

  • Objectives of IT Act , 2000
  • Exceptions to Cyber law
  • Section 3 , 4 , 5 , 6, 7 , 8, 9 [ Section 7 - V. IMP ] 4.   Section 43 , 66A , 66F , 69 , 76 , 75 , 85
  • Requirement criteria for  System Audit [ IRDA , RBI , SEBI ]
  • Cyber Forensic Audit
  • 4 Phases of ISMS
  • Key benefits of ISO 27001
  • Reasons why a company should adopt ISO 27001 [ V.IMP ]
  • ITIL [ V.IMP ]

Chapter 8 : Emerging Technologies [ Probable weight age : 10-15 Marks 



  • What is Cloud computing , Issues with Cloud computing [ V.IMP] , Goals and Objectives , Cloud computing environment , IAAS , PAAS , SAAS , Characteristics of Cloud computing , and Challenges relating to cloud computing . [ In short : All questions of cloud computing are important ]
  • BYOD and emerging BYOD Threats ?
  • What is Web 2.0 and what are its components ?
  • Green IT ? Steps to be followed for effective utilization of computing resource

 



No comments:

Post a comment