ISCA Important Topics for November 2014
Chapter 1 : Concepts of Governance and MIS [ Probable weight age : 8-12 Marks ]
- Governance dimensions
- What is IT Governance and explain its benefits .
- 5 Internal control components [ COSO framework ] – V.imp .
- Steps to be followed for aligning IT Strategy with Enterprise Strategy
- Definitions of Risk ,Threat , Vulnerability , Threats likelihood , Exposure , Countermeasure .
- 5 Risk management strategies .
- COBIT 5.0 , Benefits of COBIT , 5 Principles of COBIT [ V.IMP] and
- 7 Enablers of COBIT .
Chapter 2 : IS Concepts [ Probable weight age : 10-15 Marks ]
- Types of System .
- Information and its Attributes .
- Components of CBIS
- Charters tics of CBIS .
- What is TPS and explain its features .
- What is MIS ,
- Misconceptions of MIS ,
- Characteristics of MIS ,
- Constraints in operating MIS
- limitations of MIS .
- Characteristics of Decision support system ?
- Contents of EIS / Guidelines to Design the EIS .
- Explain the features of email .
- Benefits of expert system
- Properties that a potential system should possess to qualify for an Expert system ?
- Knowledge which an manager should possess to operate IS effectively and efficiently? [ V. IMP ]
Chapter 3 : Protection of IS [ Probable weight age : 10-15 Marks ]
- What is Risk and why do Gap arise ?
- Objectives of IS Security [ June 2014 - 4 Marks]
- What is IS Policy and what are its contents [ Imp ]
- Types/ Hierarchy of IS Policy
- Effect of Computer / technology in Internal control
- What is meant by compensatory control
- What is Boundary control and explain different boundary control techniques .
- Explain Control over Data Integrity [ Information classification , categories and policies ] – imp.
- Logical access paths
- What are the different types of
- Technical exposures if logical access controls are absent
- Computer crime exposures if logical access controls are absent
- Asynchronous attacks
- Techniques to commit cyber frauds . [ Short question ]
Chapter 4 : BCP & DRP [ Probable weight age : 6-10 Marks ]
- What is meant by BCM ? Explain the terms associated with BCM .
- BCP Manual ?
- Advantages of Business continuity .
- BCP Policy ? Objectives of BCP policy ? [ V. Imp]
- What is meant by BCP ? Areas covered by BCP .
- Objectives and Goals of BCP ?
- What is BIA ?
- Discuss Test plan ?
- Alternate processing facilities arrangements ? [ Imp ]
- Types of Backup
Chapter 5 : Acquisition , development and implementation of IS [ PW : 15-20 Marks ]
- Reasons for failure of System development activity ?
- Discuss System development methodology ?
- 6 approaches for System development [ Most imp : Prototype , RAD & Spiral ]
- What are the points to be addressed in Delineation of Scope ?
- Fact finding technique ? [ Hint : Phase 2 ]
- What are Points to addressed while analyzing Present system ? [ V. Imp]
- What is meant by SRS ? Explain its contents ? [ June 2014]
- What is meant by Data Dictionary ?
- Designing System output & System Input ? [ V. Imp]
- 4 Design Principles ? [ Short note ]
- Methods for Validation Vendors Proposal ? [ Hint : 5 Methods discussed in Phase 4 ]
- Characteristics of good Coded Program ? [ Imp ]
- Total testing phase [ Phase 5 ] is important . [ Contains Unit
testing , Integration testing ,System testing and User acceptance
testing]
- What are the activates involved in System conversion ? [ Hint : 4 activities discussed in Phase 6 ]
- System implementation conversion strategies ?
- What is PIR ? Methods ?
- System maintenance and its types [ June 2014 ]
Chapter 6 : Auditing of IS [ Probable weight age : 10-15 Marks ]
- Need for Audit of IS ?
- Effect of computers on Audit ?
- Skill set that an IS auditor should possess for Auditing IS environment ? [ V. Imp]
- Categories of IS Audit ?
- Steps in IT Audit ?
- Categories of Risk [Hint : Inherent Risk , Control Risk , Detection Risk ] – [ V. Imp]
- 4 different types of Audit tools [Hint : Snapshot , ITF , SCARF , CIS ] – [ V. Imp]
- Advantages and disadvantages of Continuous Auditing ?
- Audit trial and its Objectives ?
- What are the task performed by OS or Importance of OS ? – [ V. Imp]
- Discuss Various Backup Strategies ?
- Discuss System development Control [ Hint : 4th General control ]
- Internet and Intranet control ?
- Processing Control ? [ Hint : 2nd Application control ]
Chapter 7 : Information Technology Regulatory Issues [ Probable weight age : 10-15 Marks ]
- Objectives of IT Act , 2000
- Exceptions to Cyber law
- Section 3 , 4 , 5 , 6, 7 , 8, 9 [ Section 7 - V. IMP ] 4. Section 43 , 66A , 66F , 69 , 76 , 75 , 85
- Requirement criteria for System Audit [ IRDA , RBI , SEBI ]
- Cyber Forensic Audit
- 4 Phases of ISMS
- Key benefits of ISO 27001
- Reasons why a company should adopt ISO 27001 [ V.IMP ]
- ITIL [ V.IMP ]
Chapter 8 : Emerging Technologies [ Probable weight age : 10-15 Marks
- What is Cloud computing , Issues with Cloud computing [ V.IMP] ,
Goals and Objectives , Cloud computing environment , IAAS , PAAS , SAAS ,
Characteristics of Cloud computing , and Challenges relating to cloud
computing . [ In short : All questions of cloud computing are important ]
- BYOD and emerging BYOD Threats ?
- What is Web 2.0 and what are its components ?
- Green IT ? Steps to be followed for effective utilization of computing resource
No comments:
Post a Comment